All the vulnerabilites related to Huawei - EMUI
var-202112-0348
Vulnerability from variot
There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. plural Huawei A vulnerability related to exceptional state handling exists in smartphone products.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0348", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37052" } ] }, "cve": "CVE-2021-37052", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37052", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398885", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37052", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37052", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2018", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398885", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. plural Huawei A vulnerability related to exceptional state handling exists in smartphone products.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "VULHUB", "id": "VHN-398885" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37052", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015860", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2018", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398885", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "id": "VAR-202112-0348", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398885" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.365000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Exception\u00a0log\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173786" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.1 }, { "problemtype": "Improper handling in exceptional conditions (CWE-755) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37052" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398885" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "date": "2021-12-08T15:15:09.593000", "db": "NVD", "id": "CVE-2021-37052" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398885" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "date": "2021-12-09T17:53:01.237000", "db": "NVD", "id": "CVE-2021-37052" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2018" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to exceptional state handling in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2018" } ], "trust": 0.6 } }
var-202206-0972
Vulnerability from variot
Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI and Magic UI Exists in a vulnerability related to the lack of authentication.Information may be obtained. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. The following products and versions are affected: EMUI 10.1.0, EMUI 10.1.1, EMUI 11.0.0, EMUI 12.0.0, EMUI 11.0.1, Magic UI 3.1.0, Magic UI 3.1.1, Magic UI 4.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0972", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31752" } ] }, "cve": "CVE-2022-31752", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31752", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423585", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31752", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31752", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-1176", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423585", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31752", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI and Magic UI Exists in a vulnerability related to the lack of authentication.Information may be obtained. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. The following products and versions are affected: EMUI 10.1.0, EMUI 10.1.1, EMUI 11.0.0, EMUI 12.0.0, EMUI 11.0.1, Magic UI 3.1.0, Magic UI 3.1.1, Magic UI 4.0.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31752", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011283", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-1176", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-47646", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423585", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31752", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "id": "VAR-202206-0972", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423585" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:41.063000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196789" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-862", "trust": 1.1 }, { "problemtype": "Lack of authentication (CWE-862) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31752" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31752/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/862.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423585" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31752" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "date": "2022-06-13T16:15:08.570000", "db": "NVD", "id": "CVE-2022-31752" }, { "date": "2022-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423585" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31752" }, { "date": "2023-08-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "date": "2022-06-18T03:12:25.967000", "db": "NVD", "id": "CVE-2022-31752" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1176" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability regarding lack of authentication in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011283" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1176" } ], "trust": 0.6 } }
var-202204-1557
Vulnerability from variot
The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in a permission management vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1557", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22257" } ] }, "cve": "CVE-2022-22257", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22257", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409786", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22257", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22257", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2023", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409786", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22257", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in a permission management vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22257", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007943", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2023", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52825", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409786", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22257", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "id": "VAR-202204-1557", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409786" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:10.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189780" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22257" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22257/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409786" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22257" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "date": "2022-04-11T20:15:19.703000", "db": "NVD", "id": "CVE-2022-22257" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409786" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22257" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "date": "2022-04-18T18:13:50.083000", "db": "NVD", "id": "CVE-2022-22257" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product permission management vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007943" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ], "trust": 0.6 } }
var-202207-1150
Vulnerability from variot
Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-1150", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40016" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40016" } ] }, "cve": "CVE-2021-40016", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401417", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2021-40016", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40016", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-1040", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401417", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-40016", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" }, { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40016", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-1040", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401417", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40016", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" }, { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "id": "VAR-202207-1150", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401417" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:22.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200417" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "NVD", "id": "CVE-2021-40016" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40016/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" }, { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" }, { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401417" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-40016" }, { "date": "2022-07-12T14:15:14.760000", "db": "NVD", "id": "CVE-2021-40016" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-15T00:00:00", "db": "VULHUB", "id": "VHN-401417" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40016" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-40016" }, { "date": "2022-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1040" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI Magic UI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1040" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1040" } ], "trust": 0.6 } }
var-202112-0943
Vulnerability from variot
There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei.
A security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0943", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39998" } ] }, "cve": "CVE-2021-39998", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39998", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-05169", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401399", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39998", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39998", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-05169", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-215", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401399", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei. \n\r\n\r\nA security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39998", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017518", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05169", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-215", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401399", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "id": "VAR-202112-0943", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" } ] }, "last_update_date": "2023-12-18T12:42:10.325000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Unknown vulnerability exists in Huawei HarmonyOS HwConnectivityExService service", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315101" }, { "title": "Huawei HarmonyOS and Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172739" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39998" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05169" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401399" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "date": "2022-01-10T14:10:20.877000", "db": "NVD", "id": "CVE-2021-39998" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05169" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401399" }, { "date": "2023-01-24T05:49:00", "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "date": "2022-01-13T02:10:20.940000", "db": "NVD", "id": "CVE-2021-39998" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-215" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017518" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-215" } ], "trust": 0.6 } }
var-202101-0999
Vulnerability from variot
There is a improper input validation vulnerability in some Huawei Smartphone.Successful exploit of this vulnerability can cause memory access errors and denial of service. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. The following products and models are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0999", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9139" } ] }, "cve": "CVE-2020-9139", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9139", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187264", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9139", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9139", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1041", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187264", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a improper input validation vulnerability in some Huawei Smartphone.Successful exploit of this vulnerability can cause memory access errors and denial of service. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. The following products and models are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1", "sources": [ { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "VULHUB", "id": "VHN-187264" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9139", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015405", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1041", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187264", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "id": "VAR-202101-0999", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187264" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:29.718000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Huawei Emui and Honor Magic Ui Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139431" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9139" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187264" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "date": "2021-01-13T22:15:13.943000", "db": "NVD", "id": "CVE-2020-9139" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-187264" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "date": "2021-01-19T15:01:41.620000", "db": "NVD", "id": "CVE-2020-9139" }, { "date": "2021-01-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1041" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to input confirmation on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015405" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1041" } ], "trust": 0.6 } }
var-202201-1716
Vulnerability from variot
There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS due to repeated calls to freed pointers by the product's camera component
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1716", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40039" } ] }, "cve": "CVE-2021-40039", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40039", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401440", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40039", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40039", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-294", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401440", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS due to repeated calls to freed pointers by the product\u0027s camera component", "sources": [ { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "VULHUB", "id": "VHN-401440" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40039", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002911", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-294", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04996", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401440", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "id": "VAR-202201-1716", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401440" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:33.617000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177450" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40039" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401440" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "date": "2022-01-10T14:10:22.937000", "db": "NVD", "id": "CVE-2021-40039" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401440" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "date": "2022-01-13T15:37:04.397000", "db": "NVD", "id": "CVE-2021-40039" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-294" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 In the product \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-294" } ], "trust": 0.6 } }
var-202209-1059
Vulnerability from variot
Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1059", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-36600" } ] }, "cve": "CVE-2020-36600", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-36600", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-36600", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-1306", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "VULHUB", "id": "VHN-430126" }, { "db": "VULMON", "id": "CVE-2020-36600" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-36600", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1306", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430126", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-36600", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430126" }, { "db": "VULMON", "id": "CVE-2020-36600" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "id": "VAR-202209-1059", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430126" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:12.050000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Huawei Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208466" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430126" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36600" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2020-36600/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430126" }, { "db": "VULMON", "id": "CVE-2020-36600" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430126" }, { "db": "VULMON", "id": "CVE-2020-36600" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-430126" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2020-36600" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "date": "2022-09-16T18:15:11.347000", "db": "NVD", "id": "CVE-2020-36600" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-430126" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2020-36600" }, { "date": "2023-10-11T08:56:00", "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "date": "2022-09-20T18:18:30.113000", "db": "NVD", "id": "CVE-2020-36600" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1306" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017278" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1306" } ], "trust": 0.6 } }
var-202210-0345
Vulnerability from variot
The MPTCP module has an out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause root privilege escalation attacks implemented by modifying program information. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0345", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41578" } ] }, "cve": "CVE-2022-41578", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41578", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41578", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-175", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has an out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause root privilege escalation attacks implemented by modifying program information. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "VULHUB", "id": "VHN-437805" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41578", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018743", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-175", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437805", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "id": "VAR-202210-0345", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437805" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:47.001000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211156" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41578" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41578/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437805" }, { "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "db": "NVD", "id": "CVE-2022-41578" }, { "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437805" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "date": "2022-10-14T16:15:21.030000", "db": "NVD", "id": "CVE-2022-41578" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437805" }, { "date": "2023-10-23T06:35:00", "db": "JVNDB", "id": "JVNDB-2022-018743" }, { "date": "2022-10-18T14:49:46.290000", "db": "NVD", "id": "CVE-2022-41578" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-175" } ], "trust": 0.6 } }
var-202106-0611
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of insufficient input verification may cause the system to restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. An attacker could exploit this vulnerability to cause a system reboot. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0611", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22349" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22349" } ] }, "cve": "CVE-2021-22349", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380784", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22349", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22349", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2009", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380784", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22349", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" }, { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of insufficient input verification may cause the system to restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. An attacker could exploit this vulnerability to cause a system reboot. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22349", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2009", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380784", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22349", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" }, { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "id": "VAR-202106-0611", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380784" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:10.081000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone input verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156087" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "NVD", "id": "CVE-2021-22349" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22349" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" }, { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" }, { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380784" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22349" }, { "date": "2021-06-30T21:15:09.797000", "db": "NVD", "id": "CVE-2021-22349" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380784" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22349" }, { "date": "2021-07-06T18:51:39.057000", "db": "NVD", "id": "CVE-2021-22349" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2009" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone input verification error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2009" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2009" } ], "trust": 0.6 } }
var-202111-1591
Vulnerability from variot
There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are bypass vulnerabilities in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1591", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37032" } ] }, "cve": "CVE-2021-37032", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37032", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398865", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37032", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37032", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-1897", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398865", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398865" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are bypass vulnerabilities in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "VULHUB", "id": "VHN-398865" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37032", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015554", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1897", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102866", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398865", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398865" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "id": "VAR-202111-1591", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398865" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:31.224000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172194" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37032" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398865" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398865" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398865" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "date": "2021-11-23T16:15:09.790000", "db": "NVD", "id": "CVE-2021-37032" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398865" }, { "date": "2022-11-24T06:23:00", "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "date": "2021-12-09T17:57:50.020000", "db": "NVD", "id": "CVE-2021-37032" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1897" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015554" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1897" } ], "trust": 0.6 } }
var-202108-2207
Vulnerability from variot
A component of the Huawei smartphone has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. plural Huawei Smartphone products contain vulnerabilities related to the leakage of resources to the wrong area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2207", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22385" } ] }, "cve": "CVE-2021-22385", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22385", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380820", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22385", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22385", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-975", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380820", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22385", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the Huawei smartphone has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. plural Huawei Smartphone products contain vulnerabilities related to the leakage of resources to the wrong area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22385", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009783", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-975", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380820", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22385", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "id": "VAR-202108-2207", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380820" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:27.892000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22385", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159368" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22385" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-380820" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22385" }, { "date": "2022-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "date": "2021-08-10T14:15:07.173000", "db": "NVD", "id": "CVE-2021-22385" }, { "date": "2021-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380820" }, { "date": "2021-08-17T00:00:00", "db": "VULMON", "id": "CVE-2021-22385" }, { "date": "2022-05-23T08:41:00", "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22385" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-975" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability in leaking resources to the wrong area in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009783" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-975" } ], "trust": 0.6 } }
var-202110-1476
Vulnerability from variot
There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1476", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37001" } ] }, "cve": "CVE-2021-37001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37001", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-397930", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37001", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37001", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2101", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-397930", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-37001", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37001", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014258", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2101", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-397930", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37001", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "id": "VAR-202110-1476", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-397930" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:16.959000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-37001", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171642" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37001" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-397930" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-37001" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "date": "2021-10-28T13:15:11.387000", "db": "NVD", "id": "CVE-2021-37001" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-397930" }, { "date": "2021-11-01T00:00:00", "db": "VULMON", "id": "CVE-2021-37001" }, { "date": "2022-10-11T08:33:00", "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "date": "2021-11-01T20:50:39.007000", "db": "NVD", "id": "CVE-2021-37001" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2101" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014258" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2101" } ], "trust": 0.6 } }
var-202112-0344
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37074" } ] }, "cve": "CVE-2021-37074", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37074", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-398908", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37074", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37074", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2036", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398908", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "VULHUB", "id": "VHN-398908" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37074", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015864", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2036", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398908", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "id": "VAR-202112-0344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398908" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:58.499000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Race\u00a0condition\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173794" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37074" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398908" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "date": "2021-12-08T15:15:09.807000", "db": "NVD", "id": "CVE-2021-37074" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398908" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "date": "2021-12-09T17:55:40.317000", "db": "NVD", "id": "CVE-2021-37074" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2036" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2036" } ], "trust": 0.6 } }
var-202209-0253
Vulnerability from variot
The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0253", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39000" } ] }, "cve": "CVE-2022-39000", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39000", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39000", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-212", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39000", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017154", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-212", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81255", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428487", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39000", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "id": "VAR-202209-0253", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428487" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:37.910000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208409" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39000" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39000/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428487" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39000" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "date": "2022-09-16T18:15:17.900000", "db": "NVD", "id": "CVE-2022-39000" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-428487" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39000" }, { "date": "2023-10-11T08:51:00", "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "date": "2022-09-20T19:07:54.390000", "db": "NVD", "id": "CVE-2022-39000" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ], "trust": 0.6 } }
var-202106-0614
Vulnerability from variot
There is a Configuration Defect Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0614", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22352" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22352" } ] }, "cve": "CVE-2021-22352", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-380787", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-22352", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22352", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2010", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380787", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22352", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration Defect Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22352", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2010", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380787", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22352", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "id": "VAR-202106-0614", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380787" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:32.686000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for vulnerabilities in processing logic errors in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156088" }, { "title": "CVE-2021-22352", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22352 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22352" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22352" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22352" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380787" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22352" }, { "date": "2021-06-30T21:15:09.907000", "db": "NVD", "id": "CVE-2021-22352" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380787" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22352" }, { "date": "2021-07-06T19:45:17.737000", "db": "NVD", "id": "CVE-2021-22352" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2010" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone processing logic error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2010" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2010" } ], "trust": 0.6 } }
var-202107-1679
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1679", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22426" } ] }, "cve": "CVE-2021-22426", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22426", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380861", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22426", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22426", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2226", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380861", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "VULHUB", "id": "VHN-380861" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22426", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018585", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2226", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380861", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "id": "VAR-202107-1679", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380861" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:30.920000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202107-0000001170634565 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172003" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22426" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22426/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380861" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "date": "2022-02-25T19:15:09.207000", "db": "NVD", "id": "CVE-2021-22426" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380861" }, { "date": "2023-06-30T08:24:00", "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "date": "2022-03-07T17:50:39.693000", "db": "NVD", "id": "CVE-2021-22426" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2226" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2226" } ], "trust": 0.6 } }
var-202204-1427
Vulnerability from variot
The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1427", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46742" } ] }, "cve": "CVE-2021-46742", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46742", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-418651", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46742", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46742", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202204-2022", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-418651", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device", "sources": [ { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46742", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007971", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2022", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44618", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418651", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "id": "VAR-202204-1427", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418651" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:09.766000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189573" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46742" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46742/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-418651" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-46742" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "date": "2022-04-11T20:15:16.397000", "db": "NVD", "id": "CVE-2021-46742" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-418651" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-46742" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-46742" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ], "trust": 0.6 } }
var-202202-0422
Vulnerability from variot
There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality. EMUI Exists in unspecified vulnerabilities.Information may be obtained. Huawei EMUI is an Android-based mobile operating system developed by China's Huawei (Huawei). An attacker could exploit this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0422", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37115" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37115" } ] }, "cve": "CVE-2021-37115", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37115", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-398951", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37115", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37115", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-855", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398951", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398951" }, { "db": "JVNDB", "id": "JVNDB-2022-005123" }, { "db": "NVD", "id": "CVE-2021-37115" }, { "db": "CNNVD", "id": "CNNVD-202202-855" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality. EMUI Exists in unspecified vulnerabilities.Information may be obtained. Huawei EMUI is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei). An attacker could exploit this vulnerability to obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2021-37115" }, { "db": "JVNDB", "id": "JVNDB-2022-005123" }, { "db": "VULHUB", "id": "VHN-398951" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37115", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005123", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-855", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-64484", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398951", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398951" }, { "db": "JVNDB", "id": "JVNDB-2022-005123" }, { "db": "NVD", "id": "CVE-2021-37115" }, { "db": "CNNVD", "id": "CNNVD-202202-855" } ] }, "id": "VAR-202202-0422", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398951" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:33.080000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184117" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005123" }, { "db": "CNNVD", "id": "CNNVD-202202-855" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005123" }, { "db": "NVD", "id": "CVE-2021-37115" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37115" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398951" }, { "db": "JVNDB", "id": "JVNDB-2022-005123" }, { "db": "NVD", "id": "CVE-2021-37115" }, { "db": "CNNVD", "id": "CNNVD-202202-855" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398951" }, { "db": "JVNDB", "id": "JVNDB-2022-005123" }, { "db": "NVD", "id": "CVE-2021-37115" }, { "db": "CNNVD", "id": "CNNVD-202202-855" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-398951" }, { "date": "2023-05-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005123" }, { "date": "2022-02-09T23:15:15.983000", "db": "NVD", "id": "CVE-2021-37115" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-855" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398951" }, { "date": "2023-05-18T07:52:00", "db": "JVNDB", "id": "JVNDB-2022-005123" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37115" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-855" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-855" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005123" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-855" } ], "trust": 0.6 } }
var-202110-1481
Vulnerability from variot
There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1481", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36995" } ] }, "cve": "CVE-2021-36995", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36995", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398828", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36995", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36995", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2094", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398828", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398828" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "VULHUB", "id": "VHN-398828" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36995", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014263", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2094", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398828", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398828" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "id": "VAR-202110-1481", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398828" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:02.310000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36995", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168231" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36995" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398828" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398828" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398828" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "date": "2021-10-28T13:15:10.787000", "db": "NVD", "id": "CVE-2021-36995" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398828" }, { "date": "2022-10-11T08:47:00", "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "date": "2021-11-01T21:24:48.403000", "db": "NVD", "id": "CVE-2021-36995" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2094" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014263" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2094" } ], "trust": 0.6 } }
var-202206-0375
Vulnerability from variot
The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0375", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31763" } ] }, "cve": "CVE-2022-31763", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31763", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423596", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31763", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31763", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-478", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423596", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "VULHUB", "id": "VHN-423596" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31763", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-011276", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-478", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-47648", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423596", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "id": "VAR-202206-0375", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423596" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:25.268000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196702" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31763" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31763/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423596" }, { "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "db": "NVD", "id": "CVE-2022-31763" }, { "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423596" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "date": "2022-06-13T15:15:10.530000", "db": "NVD", "id": "CVE-2022-31763" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423596" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011276" }, { "date": "2022-06-18T03:11:49.183000", "db": "NVD", "id": "CVE-2022-31763" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-478" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-478" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011276" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-478" } ], "trust": 0.6 } }
var-202106-0594
Vulnerability from variot
There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0594", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22370" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22370" } ] }, "cve": "CVE-2021-22370", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380805", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22370", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22370", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1982", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380805", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22370", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" }, { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22370", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1982", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380805", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22370", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" }, { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "id": "VAR-202106-0594", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380805" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:25.747000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156066" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22370" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/522.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" }, { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" }, { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380805" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22370" }, { "date": "2021-06-30T14:15:08.590000", "db": "NVD", "id": "CVE-2021-22370" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380805" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22370" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22370" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1982" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1982" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1982" } ], "trust": 0.6 } }
var-202108-2218
Vulnerability from variot
There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2218", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22387" } ] }, "cve": "CVE-2021-22387", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22387", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380822", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22387", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22387", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-103", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380822", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22387", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22387", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010879", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-103", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380822", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22387", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "id": "VAR-202108-2218", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380822" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:48.781000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22387", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159050" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-913", "trust": 1.1 }, { "problemtype": "Improper control of dynamically manipulated code resources (CWE-913) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22387" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/913.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380822" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22387" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "date": "2021-08-02T17:15:13.783000", "db": "NVD", "id": "CVE-2021-22387" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380822" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22387" }, { "date": "2022-07-11T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "date": "2021-12-09T17:55:11.013000", "db": "NVD", "id": "CVE-2021-22387" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-103" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in improper control of dynamically manipulated code resources on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010879" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-103" } ], "trust": 0.6 } }
var-202211-0397
Vulnerability from variot
The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0397", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44559" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44559" } ] }, "cve": "CVE-2022-44559", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44559", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2124", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "VULHUB", "id": "VHN-441949" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44559", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2124", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441949", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "id": "VAR-202211-0397", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441949" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:27.224000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214354" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "NVD", "id": "CVE-2022-44559" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44559" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44559/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441949" }, { "db": "NVD", "id": "CVE-2022-44559" }, { "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441949" }, { "date": "2022-11-09T21:15:18.727000", "db": "NVD", "id": "CVE-2022-44559" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441949" }, { "date": "2022-11-14T19:09:05.380000", "db": "NVD", "id": "CVE-2022-44559" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2124" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2124" } ], "trust": 0.6 } }
var-202112-0327
Vulnerability from variot
There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0327", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37075" } ] }, "cve": "CVE-2021-37075", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37075", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398909", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37075", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37075", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2057", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398909", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "VULHUB", "id": "VHN-398909" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37075", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015865", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2057", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398909", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "id": "VAR-202112-0327", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398909" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.388000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Credential\u00a0management\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173804" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-522", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37075" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398909" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "date": "2021-12-08T15:15:09.867000", "db": "NVD", "id": "CVE-2021-37075" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398909" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37075" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2057" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2057" } ], "trust": 0.6 } }
var-202107-1677
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Buffer Overflow in BootROM USB Stack. Affected devices are Huawei Mate 30 Pro (LIO), Huawei P40 Pro (ELS), Huawei P40 (ANA), Huawei Nova 5T (YAL)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1677", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22429" } ] }, "cve": "CVE-2021-22429", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22429", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380864", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22429", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22429", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2228", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380864", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Buffer Overflow in BootROM USB Stack. Affected devices are Huawei Mate 30 Pro (LIO), Huawei P40 Pro (ELS), Huawei P40 (ANA), Huawei Nova 5T (YAL)", "sources": [ { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22429", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018746", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2228", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380864", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22429", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "id": "VAR-202107-1677", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380864" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:32.961000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172015" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22429" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22429/" }, { "trust": 0.1, "url": "https://labs.taszk.io/blog/post/bootrom_usb/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380864" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "date": "2022-02-25T19:15:09.387000", "db": "NVD", "id": "CVE-2021-22429" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380864" }, { "date": "2023-07-06T01:52:00", "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "date": "2022-03-07T17:54:50.527000", "db": "NVD", "id": "CVE-2021-22429" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2228" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2228" } ], "trust": 0.6 } }
var-202207-0180
Vulnerability from variot
The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0180", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34738" } ] }, "cve": "CVE-2022-34738", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34738", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427080", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34738", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34738", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-412", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427080", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34738", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34738", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013202", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-412", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52820", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427080", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34738", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "id": "VAR-202207-0180", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427080" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:57.855000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199750" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34738" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34738/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427080" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34738" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "date": "2022-07-12T14:15:19.377000", "db": "NVD", "id": "CVE-2022-34738" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427080" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34738" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "date": "2022-07-19T12:42:40.837000", "db": "NVD", "id": "CVE-2022-34738" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ], "trust": 0.6 } }
var-202208-0784
Vulnerability from variot
The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0784", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37004" } ] }, "cve": "CVE-2022-37004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37004", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2398", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "VULHUB", "id": "VHN-427495" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37004", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014552", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2398", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427495", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "id": "VAR-202208-0784", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427495" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:23.550000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204368" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37004" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37004/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427495" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "date": "2022-08-10T20:16:04.263000", "db": "NVD", "id": "CVE-2022-37004" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427495" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "date": "2022-08-15T18:00:46.777000", "db": "NVD", "id": "CVE-2022-37004" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ], "trust": 0.6 } }
var-202110-1487
Vulnerability from variot
There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1487", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36988" } ] }, "cve": "CVE-2021-36988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36988", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398820", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36988", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36988", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2085", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398820", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398820" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "VULHUB", "id": "VHN-398820" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36988", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014306", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2085", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398820", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398820" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "id": "VAR-202110-1487", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398820" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:23.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36988", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171596" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36988" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398820" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398820" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398820" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "date": "2021-10-28T13:15:10.487000", "db": "NVD", "id": "CVE-2021-36988" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398820" }, { "date": "2022-10-12T08:20:00", "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "date": "2021-11-01T23:14:10.413000", "db": "NVD", "id": "CVE-2021-36988" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2085" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014306" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2085" } ], "trust": 0.6 } }
var-202210-0291
Vulnerability from variot
The facial recognition module has a vulnerability in input validation.Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38985" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38985" } ] }, "cve": "CVE-2022-38985", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38985", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-146", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The facial recognition module has a vulnerability in input validation.Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "VULHUB", "id": "VHN-434764" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38985", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-146", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434764", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "id": "VAR-202210-0291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434764" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:32.237000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211143" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "NVD", "id": "CVE-2022-38985" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38985/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434764" }, { "db": "NVD", "id": "CVE-2022-38985" }, { "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434764" }, { "date": "2022-10-14T16:15:15.777000", "db": "NVD", "id": "CVE-2022-38985" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434764" }, { "date": "2022-10-18T15:38:09.590000", "db": "NVD", "id": "CVE-2022-38985" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-146" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-146" } ], "trust": 0.6 } }
var-202110-1498
Vulnerability from variot
There is an Uninitialized variable vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of invalid data. Huawei Smartphones contain a resource initialization vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1498", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22482" } ] }, "cve": "CVE-2021-22482", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22482", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380917", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22482", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22482", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2072", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380917", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22482", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Uninitialized variable vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of invalid data. Huawei Smartphones contain a resource initialization vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22482", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014317", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2072", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380917", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22482", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "id": "VAR-202110-1498", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380917" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:40.282000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22482", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168213" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-909", "trust": 1.1 }, { "problemtype": "Inadequate resource initialization (CWE-909) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22482" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/909.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380917" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22482" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "date": "2021-10-28T13:15:09.990000", "db": "NVD", "id": "CVE-2021-22482" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380917" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22482" }, { "date": "2022-10-12T08:46:00", "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "date": "2021-11-02T00:13:02.573000", "db": "NVD", "id": "CVE-2021-22482" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2072" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to insufficient initialization of resources in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014317" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2072" } ], "trust": 0.6 } }
var-202106-0610
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0610", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22348" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22348" } ] }, "cve": "CVE-2021-22348", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380783", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22348", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22348", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-2007", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380783", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22348", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" }, { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22348", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2007", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380783", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22348", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" }, { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "id": "VAR-202106-0610", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380783" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:20.514000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156085" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "NVD", "id": "CVE-2021-22348" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22348" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" }, { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" }, { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380783" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22348" }, { "date": "2021-06-30T21:15:09.760000", "db": "NVD", "id": "CVE-2021-22348" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380783" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22348" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22348" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2007" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2007" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2007" } ], "trust": 0.6 } }
var-201711-0258
Vulnerability from variot
The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges. plural Huawei Smartphone software contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei EMUI is prone to a directory-traversal vulnerability and a command-injection vulnerability because it fails to sufficiently sanitize user-supplied input. Attackers can use a specially crafted request with directory-traversal sequences ('../') to decompress malicious files into the target path, or execute arbitrary commands and gain elevated privileges. Huawei Maimang 4, etc. are all smartphone products of China's Huawei (Huawei). EMUI is a smart terminal human-computer interaction system based on the Android platform used in it. keyguard is one of the lock screen applications. EMUI 3 in various Huawei products. The privilege escalation vulnerability exists in the keyguard application of version 1. The vulnerability stems from insufficient checking of specific parameters in the keyguard application
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0258", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "honor 6", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "h60-l04c900b530" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-al10c92b220" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-al10c00b220" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-ul00c17b220" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-tl00c01b230sp01" }, { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-cl00c92b172" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-l01c636b130" }, { "model": "g8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-al00c00b220" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c464b150" }, { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-ul00c00b172" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-cl00c92b230" }, { "model": "honor 6", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "h60-l04c185b523" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c10b150" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c185b200" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-cl00c92b210" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l02c635b140" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l02c636b140" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c636b200" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-tl00c01b250" }, { "model": "mate 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "mt7-l09c900b339" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l23c605b190" }, { "model": "honor 6", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "h60-l04c636b527" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-l01c432b187" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-ul00c10b201" }, { "model": "mate 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "mt7-l09c605b325" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-l09c432b222" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-ul00c432b220" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-l01c10b140" }, { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-tl00c01b172" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-tl00c01b210" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-tl00hc01b210" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-al00c00b220" }, { "model": "g8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-cl00c92b220" }, { "model": "g8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-tl00c01b220" }, { "model": "mate 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "mt7-tl10c900b339" }, { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-ul20c432b171" }, { "model": "honor 6", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "h60-l04c10b523" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-al00c92b200" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-ul00c00b210" }, { "model": "g8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-ul00c00b220" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c432b214" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-al00c00b210" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-ul00c00b230" }, { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-l09c432b180" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-tl01hc01b220" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-l01c432b190" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-cl00c92b220" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-ul00c00b250." }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-tl00c01b220" }, { "model": "g8", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "honor 6", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "honor 7", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "mate 7", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "mate s", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "p8 lite", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "p8", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "shotx", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-tl00hc01b210" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-al00c00b220" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-al00c00b210" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-tl00c01b210" }, { "model": "g8", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-tl00c01b220" }, { "model": "g8", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-cl00c92b220" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-cl00c92b210" }, { "model": "g8", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-ul00c00b220" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-ul00c00b210" }, { "model": "g8", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-al00c00b220" }, { "model": "shotx ath-ul00c00b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-tl00hc01b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-tl00c01b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-cl00c92b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-al00c92b200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-al00c00b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-ul00c00b250", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-tl00c01b250", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l23c605b190", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c636b200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c464b150", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c432b214", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c185b200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-ul00c00b230", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-tl00c01b230sp01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-cl00c92b230", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-ul00c00b172", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-tl00c01b172", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-cl00c92b172", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "honor plk-ul00c17b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-tl01hc01b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-tl00c01b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c636b130", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c432b190", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c432b187", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c185b130", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c10b140", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-al10c92b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-al10c00b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "g8 rio-ul00c00b220", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-tl00c01b220", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-cl00c92b220", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-al00c00b220", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "emui", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "3.1" }, { "model": "shotx ath-ul00c00b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-tl00hc01b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-tl00c01b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-cl00c92b380", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-al00c92b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-al00c00b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-ul00c00b571", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-tl00c01b575", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l23c605b527", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c636b563", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c464b581", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c432b585", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c185b562", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-ul00c00b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-tl00c01b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-cl00c92b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-ul00c00b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-tl00c01b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-cl00c92b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "honor plk-ul00c17b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-tl01hc01b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-tl00c01b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c636b350", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c432b380", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c185b380", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c10b331", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-cl00c92b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-al10c92b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-al10c00b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "g8 rio-ul00c00b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-tl00c01b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-cl00c92b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-al00c00b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "BID", "id": "95919" }, { "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "db": "NVD", "id": "CVE-2017-2692" }, { "db": "CNNVD", "id": "CNNVD-201702-248" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l02c635b140", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l02c636b140", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c10b150", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c185b200", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c432b214", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c464b150", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c636b200", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l23c605b190", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-tl00c01b250", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-ul00c00b250.", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "mt7-l09c605b325", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "mt7-l09c900b339", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "mt7-tl10c900b339", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-cl00c92b172", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-l09c432b180", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-tl00c01b172", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-ul00c00b172", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-ul20c432b171", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-cl00c92b230", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-l09c432b222", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-tl00c01b230sp01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-ul00c00b230", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-ul00c10b201", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-ul00c432b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "h60-l04c10b523", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "h60-l04c185b523", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "h60-l04c636b527", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "h60-l04c900b530", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-al10c00b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-al10c92b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-cl00c92b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c10b140", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c10b140", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c432b187", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c432b190", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c636b130", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-tl00c01b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-tl01hc01b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-ul00c17b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-al00c92b200", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-cl00c92b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-tl00c01b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-tl00hc01b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-ul00c00b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-al00c00b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-al00c00b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-al00c00b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-cl00c92b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-tl00c01b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-ul00c00b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-2692" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Flanker from the Keen Security Lab of Tencent.", "sources": [ { "db": "BID", "id": "95919" }, { "db": "CNNVD", "id": "CNNVD-201702-248" } ], "trust": 0.9 }, "cve": "CVE-2017-2692", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2017-2692", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-110895", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-2692", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-2692", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201702-248", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-110895", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-110895" }, { "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "db": "NVD", "id": "CVE-2017-2692" }, { "db": "CNNVD", "id": "CNNVD-201702-248" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges. plural Huawei Smartphone software contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei EMUI is prone to a directory-traversal vulnerability and a command-injection vulnerability because it fails to sufficiently sanitize user-supplied input. \nAttackers can use a specially crafted request with directory-traversal sequences (\u0027../\u0027) to decompress malicious files into the target path, or execute arbitrary commands and gain elevated privileges. Huawei Maimang 4, etc. are all smartphone products of China\u0027s Huawei (Huawei). EMUI is a smart terminal human-computer interaction system based on the Android platform used in it. keyguard is one of the lock screen applications. EMUI 3 in various Huawei products. The privilege escalation vulnerability exists in the keyguard application of version 1. The vulnerability stems from insufficient checking of specific parameters in the keyguard application", "sources": [ { "db": "NVD", "id": "CVE-2017-2692" }, { "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "db": "BID", "id": "95919" }, { "db": "VULHUB", "id": "VHN-110895" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2692", "trust": 2.8 }, { "db": "BID", "id": "95919", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2017-010501", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201702-248", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-110895", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110895" }, { "db": "BID", "id": "95919" }, { "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "db": "NVD", "id": "CVE-2017-2692" }, { "db": "CNNVD", "id": "CNNVD-201702-248" } ] }, "id": "VAR-201711-0258", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-110895" } ], "trust": 0.69526687 }, "last_update_date": "2023-12-18T12:29:20.570000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20170125-01-emui", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" }, { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=67639" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "db": "CNNVD", "id": "CNNVD-201702-248" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110895" }, { "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "db": "NVD", "id": "CVE-2017-2692" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/95919" }, { "trust": 1.7, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2692" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2692" }, { "trust": 0.3, "url": "http://www.huawei.com/en/" }, { "trust": 0.3, "url": "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170125-01-emui-en" } ], "sources": [ { "db": "VULHUB", "id": "VHN-110895" }, { "db": "BID", "id": "95919" }, { "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "db": "NVD", "id": "CVE-2017-2692" }, { "db": "CNNVD", "id": "CNNVD-201702-248" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-110895" }, { "db": "BID", "id": "95919" }, { "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "db": "NVD", "id": "CVE-2017-2692" }, { "db": "CNNVD", "id": "CNNVD-201702-248" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-22T00:00:00", "db": "VULHUB", "id": "VHN-110895" }, { "date": "2017-01-25T00:00:00", "db": "BID", "id": "95919" }, { "date": "2017-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "date": "2017-11-22T19:29:00.333000", "db": "NVD", "id": "CVE-2017-2692" }, { "date": "2017-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-248" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-07T00:00:00", "db": "VULHUB", "id": "VHN-110895" }, { "date": "2017-02-02T00:09:00", "db": "BID", "id": "95919" }, { "date": "2017-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010501" }, { "date": "2017-12-07T18:56:07.573000", "db": "NVD", "id": "CVE-2017-2692" }, { "date": "2017-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-248" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-248" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Command injection vulnerability in smartphone software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010501" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-248" } ], "trust": 0.6 } }
var-202201-1719
Vulnerability from variot
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1719", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40029" } ] }, "cve": "CVE-2021-40029", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40029", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401430", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40029", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40029", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-282", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401430", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "VULHUB", "id": "VHN-401430" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40029", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002897", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-282", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04995", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401430", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "id": "VAR-202201-1719", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401430" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:18.632000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177999" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40029" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401430" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "date": "2022-01-10T14:10:21.920000", "db": "NVD", "id": "CVE-2021-40029" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401430" }, { "date": "2023-01-25T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "date": "2022-01-13T14:34:52.030000", "db": "NVD", "id": "CVE-2021-40029" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-282" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-282" } ], "trust": 0.6 } }
var-202112-0134
Vulnerability from variot
There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart. Huawei A vulnerability related to input validation exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0134", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37047" } ] }, "cve": "CVE-2021-37047", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37047", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398880", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37047", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37047", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-462", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398880", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart. Huawei A vulnerability related to input validation exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "VULHUB", "id": "VHN-398880" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37047", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015792", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-462", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398880", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "id": "VAR-202112-0134", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398880" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:58.717000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173134" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37047" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398880" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "date": "2021-12-07T16:15:07.537000", "db": "NVD", "id": "CVE-2021-37047" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398880" }, { "date": "2022-11-30T04:53:00", "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "date": "2021-12-07T19:48:42.293000", "db": "NVD", "id": "CVE-2021-37047" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-462" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015792" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-462" } ], "trust": 0.6 } }
var-202208-0507
Vulnerability from variot
The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an inadequate validation of data reliability vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0507", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37008" } ] }, "cve": "CVE-2022-37008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37008", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37008", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2400", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an inadequate validation of data reliability vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "VULHUB", "id": "VHN-427493" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37008", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014548", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2400", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427493", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "id": "VAR-202208-0507", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427493" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:24.099000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204370" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37008" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37008/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427493" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "date": "2022-08-10T20:16:04.967000", "db": "NVD", "id": "CVE-2022-37008" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427493" }, { "date": "2023-09-20T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "date": "2022-08-15T17:58:26.997000", "db": "NVD", "id": "CVE-2022-37008" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Insufficient Validation of Data Trust in Products Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ], "trust": 0.6 } }
var-202202-0420
Vulnerability from variot
There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. EMUI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei EMUI is an Android-based mobile operating system developed by China's Huawei (Huawei). An attacker could exploit this vulnerability to execute arbitrary code on the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0420", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "db": "NVD", "id": "CVE-2021-39994" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39994" } ] }, "cve": "CVE-2021-39994", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39994", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401395", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39994", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39994", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202202-859", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401395", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401395" }, { "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "db": "NVD", "id": "CVE-2021-39994" }, { "db": "CNNVD", "id": "CNNVD-202202-859" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. EMUI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei EMUI is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei). An attacker could exploit this vulnerability to execute arbitrary code on the system", "sources": [ { "db": "NVD", "id": "CVE-2021-39994" }, { "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "db": "VULHUB", "id": "VHN-401395" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39994", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005387", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-859", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-64481", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401395", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401395" }, { "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "db": "NVD", "id": "CVE-2021-39994" }, { "db": "CNNVD", "id": "CNNVD-202202-859" } ] }, "id": "VAR-202202-0420", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401395" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:14.555000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184120" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "db": "CNNVD", "id": "CNNVD-202202-859" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "db": "NVD", "id": "CVE-2021-39994" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39994" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401395" }, { "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "db": "NVD", "id": "CVE-2021-39994" }, { "db": "CNNVD", "id": "CNNVD-202202-859" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401395" }, { "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "db": "NVD", "id": "CVE-2021-39994" }, { "db": "CNNVD", "id": "CNNVD-202202-859" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401395" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "date": "2022-02-09T23:15:16.233000", "db": "NVD", "id": "CVE-2021-39994" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-859" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401395" }, { "date": "2023-05-30T05:07:00", "db": "JVNDB", "id": "JVNDB-2022-005387" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-39994" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-859" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-859" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005387" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-859" } ], "trust": 0.6 } }
var-202108-2217
Vulnerability from variot
There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2217", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22391" } ] }, "cve": "CVE-2021-22391", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22391", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380826", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22391", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22391", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-111", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380826", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22391", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset", "sources": [ { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22391", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010872", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-111", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380826", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22391", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "id": "VAR-202108-2217", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380826" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:19.223000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22391", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159053" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Buffer size calculation error (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22391" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380826" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22391" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "date": "2021-08-02T17:15:13.983000", "db": "NVD", "id": "CVE-2021-22391" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380826" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22391" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "date": "2021-12-09T17:55:11.020000", "db": "NVD", "id": "CVE-2021-22391" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-111" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding buffer size calculation error in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010872" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-111" } ], "trust": 0.6 } }
var-202110-1851
Vulnerability from variot
There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1851", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37110" } ] }, "cve": "CVE-2021-37110", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37110", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398946", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37110", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37110", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2230", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398946", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37110", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2230", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398946", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37110", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "id": "VAR-202110-1851", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398946" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.373000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176778" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37110" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398946" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37110" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "date": "2022-01-03T22:15:09", "db": "NVD", "id": "CVE-2021-37110" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398946" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37110" }, { "date": "2023-01-17T07:06:00", "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "date": "2022-01-11T19:27:32.067000", "db": "NVD", "id": "CVE-2021-37110" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2230" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2230" } ], "trust": 0.6 } }
var-202110-1500
Vulnerability from variot
There is an Improper permission management vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones are vulnerable to improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1500", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22475" } ] }, "cve": "CVE-2021-22475", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22475", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380910", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22475", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22475", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2069", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380910", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper permission management vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones are vulnerable to improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "VULHUB", "id": "VHN-380910" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22475", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014319", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2069", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380910", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "id": "VAR-202110-1500", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380910" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.477000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22475", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168211" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22475" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380910" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "date": "2021-10-28T13:15:09.873000", "db": "NVD", "id": "CVE-2021-22475" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380910" }, { "date": "2022-10-12T08:48:00", "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "date": "2021-11-02T00:13:45.947000", "db": "NVD", "id": "CVE-2021-22475" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2069" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Default Permission Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014319" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2069" } ], "trust": 0.6 } }
var-202204-0765
Vulnerability from variot
The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0765", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46740" } ] }, "cve": "CVE-2021-46740", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46740", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-418649", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46740", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46740", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2012", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418649", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46740", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device", "sources": [ { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46740", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007972", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2012", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44619", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418649", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46740", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "id": "VAR-202204-0765", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418649" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:01.061000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189571" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46740" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46740/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418649" }, { "db": "VULMON", "id": "CVE-2021-46740" }, { "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "db": "NVD", "id": "CVE-2021-46740" }, { "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-418649" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-46740" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "date": "2022-04-11T20:15:16.350000", "db": "NVD", "id": "CVE-2021-46740" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-15T00:00:00", "db": "VULHUB", "id": "VHN-418649" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-46740" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-007972" }, { "date": "2022-04-15T20:06:33.793000", "db": "NVD", "id": "CVE-2021-46740" }, { "date": "2022-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007972" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2012" } ], "trust": 0.6 } }
var-202205-0438
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a denial of service vulnerability in the HUAWEI HarmonyOS AI business component. The vulnerability is due to the fact that hiaiserver does not perform strict legality verification on the weights in the model
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0438", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22261" } ] }, "cve": "CVE-2022-22261", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22261", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409790", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22261", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22261", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2545", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409790", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22261", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a denial of service vulnerability in the HUAWEI HarmonyOS AI business component. The vulnerability is due to the fact that hiaiserver does not perform strict legality verification on the weights in the model", "sources": [ { "db": "NVD", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22261", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009671", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2545", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-41787", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409790", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22261", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "id": "VAR-202205-0438", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409790" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T02:00:39.949000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193766" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22261" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22261/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409790" }, { "db": "VULMON", "id": "CVE-2022-22261" }, { "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "db": "NVD", "id": "CVE-2022-22261" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409790" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22261" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "date": "2022-05-13T15:15:08.840000", "db": "NVD", "id": "CVE-2022-22261" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-409790" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2022-22261" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009671" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2545" }, { "date": "2022-05-23T18:43:51.920000", "db": "NVD", "id": "CVE-2022-22261" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2545" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009671" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2545" } ], "trust": 0.6 } }
var-202204-1291
Vulnerability from variot
A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a fraudulent authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. An attacker could exploit this vulnerability to cause unauthorized access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22254" } ] }, "cve": "CVE-2022-22254", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-22254", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409783", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22254", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22254", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2034", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409783", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22254", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a fraudulent authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. An attacker could exploit this vulnerability to cause unauthorized access", "sources": [ { "db": "NVD", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22254", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-008144", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2034", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44622", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409783", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "id": "VAR-202204-1291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409783" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:57:52.130000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=190070" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Illegal authentication (CWE-863) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22254" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22254/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409783" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22254" }, { "date": "2023-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "date": "2022-04-11T20:15:19.567000", "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-19T00:00:00", "db": "VULHUB", "id": "VHN-409783" }, { "date": "2023-08-08T00:00:00", "db": "VULMON", "id": "CVE-2022-22254" }, { "date": "2023-07-24T08:23:00", "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-22254" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2034" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Fraudulent Authentication Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008144" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2034" } ], "trust": 0.6 } }
var-202205-0302
Vulnerability from variot
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0302", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29795" } ] }, "cve": "CVE-2022-29795", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29795", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421304", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29795", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29795", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2553", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421304", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29795", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009626", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2553", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47651", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421304", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29795", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "id": "VAR-202205-0302", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421304" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:49.443000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193774" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29795" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29795/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421304" }, { "db": "VULMON", "id": "CVE-2022-29795" }, { "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "db": "NVD", "id": "CVE-2022-29795" }, { "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421304" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29795" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "date": "2022-05-13T15:15:10.033000", "db": "NVD", "id": "CVE-2022-29795" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421304" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29795" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009626" }, { "date": "2022-05-23T18:39:58.577000", "db": "NVD", "id": "CVE-2022-29795" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2553" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2553" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009626" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2553" } ], "trust": 0.6 } }
var-202106-0608
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds memory write. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0608", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22345" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22345" } ] }, "cve": "CVE-2021-22345", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380780", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22345", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22345", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-2012", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380780", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22345", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" }, { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds memory write. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22345", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2012", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380780", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22345", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" }, { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "id": "VAR-202106-0608", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380780" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:50.613000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone input verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156090" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "NVD", "id": "CVE-2021-22345" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22345" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" }, { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" }, { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380780" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22345" }, { "date": "2021-06-30T22:15:08.123000", "db": "NVD", "id": "CVE-2021-22345" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380780" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22345" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22345" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone input verification error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2012" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2012" } ], "trust": 0.6 } }
var-202206-0119
Vulnerability from variot
The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0119", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31756" } ] }, "cve": "CVE-2022-31756", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31756", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423589", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31756", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31756", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-476", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423589", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31756", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31756", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011280", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-476", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66180", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423589", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31756", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "id": "VAR-202206-0119", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423589" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:39.501000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195991" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31756" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31756/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423589" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31756" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "date": "2022-06-13T15:15:10.150000", "db": "NVD", "id": "CVE-2022-31756" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423589" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31756" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "date": "2022-06-18T03:07:52.780000", "db": "NVD", "id": "CVE-2022-31756" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ], "trust": 0.6 } }
var-202203-0269
Vulnerability from variot
There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0269", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40063" } ] }, "cve": "CVE-2021-40063", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40063", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401464", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40063", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40063", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-972", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401464", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "VULHUB", "id": "VHN-401464" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40063", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018701", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-972", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401464", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "id": "VAR-202203-0269", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401464" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:13.670000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185886" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40063" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40063/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401464" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "date": "2022-03-10T17:43:24.527000", "db": "NVD", "id": "CVE-2021-40063" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401464" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "date": "2022-03-14T16:17:53.347000", "db": "NVD", "id": "CVE-2021-40063" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ], "trust": 0.6 } }
var-202111-1768
Vulnerability from variot
There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down. plural Huawei For smartphone products, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1768", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39973" } ] }, "cve": "CVE-2021-39973", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39973", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401374", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39973", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39973", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2132", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401374", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down. plural Huawei For smartphone products, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39973", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017607", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2132", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401374", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39973", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "id": "VAR-202111-1768", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401374" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:39.766000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176793" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39973" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401374" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39973" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "date": "2022-01-03T22:15:10.283000", "db": "NVD", "id": "CVE-2021-39973" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401374" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39973" }, { "date": "2023-01-27T06:59:00", "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "date": "2022-01-13T15:52:06.580000", "db": "NVD", "id": "CVE-2021-39973" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2132" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 in smartphone products \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2132" } ], "trust": 0.6 } }
var-202301-0683
Vulnerability from variot
The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0683", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-47976" } ] }, "cve": "CVE-2022-47976", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-47976", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-47976", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-434", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-47976", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001766", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-434", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449904", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-47976", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "id": "VAR-202301-0683", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449904" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:04.345000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221311" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-47976" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-47976/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449904" }, { "db": "VULMON", "id": "CVE-2022-47976" }, { "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "db": "NVD", "id": "CVE-2022-47976" }, { "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449904" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-47976" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "date": "2023-01-06T20:15:09.937000", "db": "NVD", "id": "CVE-2022-47976" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449904" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-47976" }, { "date": "2023-05-09T01:29:00", "db": "JVNDB", "id": "JVNDB-2023-001766" }, { "date": "2023-01-12T15:57:52.347000", "db": "NVD", "id": "CVE-2022-47976" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-434" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-434" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001766" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-434" } ], "trust": 0.6 } }
var-202208-0562
Vulnerability from variot
The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0562", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37007" } ] }, "cve": "CVE-2022-37007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37007", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37007", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2402", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "VULHUB", "id": "VHN-427491" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37007", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014549", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2402", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427491", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "id": "VAR-202208-0562", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427491" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:45.959000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204372" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37007" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37007/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427491" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "date": "2022-08-10T20:16:04.797000", "db": "NVD", "id": "CVE-2022-37007" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427491" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "date": "2022-08-15T17:59:09.927000", "db": "NVD", "id": "CVE-2022-37007" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ], "trust": 0.6 } }
var-202110-1848
Vulnerability from variot
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Some Huawei smart screens in Huawei HarmonyOS Vision have security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1848", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37117" } ] }, "cve": "CVE-2021-37117", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37117", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398953", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37117", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37117", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2233", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398953", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Some Huawei smart screens in Huawei HarmonyOS Vision have security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37117", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017311", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2233", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04710", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398953", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37117", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "id": "VAR-202110-1848", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398953" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:23.733000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176781" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37117" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398953" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37117" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "date": "2022-01-03T22:15:09.347000", "db": "NVD", "id": "CVE-2021-37117" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398953" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37117" }, { "date": "2023-01-13T06:27:00", "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "date": "2022-01-11T19:46:26.163000", "db": "NVD", "id": "CVE-2021-37117" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2233" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2233" } ], "trust": 0.6 } }
var-202208-0488
Vulnerability from variot
The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability in inserting or modifying arguments.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0488", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37005" } ] }, "cve": "CVE-2022-37005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37005", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2396", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability in inserting or modifying arguments.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37005", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014551", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2396", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427497", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37005", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "id": "VAR-202208-0488", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427497" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:39.778000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for parameter injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204366" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.1 }, { "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37005" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37005/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427497" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37005" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "date": "2022-08-10T20:16:04.443000", "db": "NVD", "id": "CVE-2022-37005" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427497" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37005" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "date": "2022-08-15T18:00:07.387000", "db": "NVD", "id": "CVE-2022-37005" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Argument insertion or modification vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "parameter injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ], "trust": 0.6 } }
var-202204-1425
Vulnerability from variot
The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure to properly process the input error message, and an attacker can exploit this vulnerability to cause a denial of service for the application
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1425", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22255" } ] }, "cve": "CVE-2022-22255", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22255", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409784", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22255", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22255", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2035", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409784", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22255", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from the failure to properly process the input error message, and an attacker can exploit this vulnerability to cause a denial of service for the application", "sources": [ { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22255", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007944", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2035", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44620", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409784", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22255", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "id": "VAR-202204-1425", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409784" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:43.527000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189782" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22255" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22255/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409784" }, { "db": "VULMON", "id": "CVE-2022-22255" }, { "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "db": "NVD", "id": "CVE-2022-22255" }, { "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409784" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22255" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "date": "2022-04-11T20:15:19.613000", "db": "NVD", "id": "CVE-2022-22255" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409784" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22255" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007944" }, { "date": "2022-04-18T20:56:42.180000", "db": "NVD", "id": "CVE-2022-22255" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007944" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2035" } ], "trust": 0.6 } }
var-202211-0417
Vulnerability from variot
The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0417", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" } ] }, "cve": "CVE-2022-44557", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44557", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2129", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "VULHUB", "id": "VHN-441945" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44557", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2129", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441945", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441945" }, { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "id": "VAR-202211-0417", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441945" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:46.775000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214356" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44557" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44557" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44557/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441945" }, { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441945" }, { "db": "NVD", "id": "CVE-2022-44557" }, { "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441945" }, { "date": "2022-11-09T21:15:18.617000", "db": "NVD", "id": "CVE-2022-44557" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441945" }, { "date": "2022-11-14T19:10:30.747000", "db": "NVD", "id": "CVE-2022-44557" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2129" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2129" } ], "trust": 0.6 } }
var-202111-1592
Vulnerability from variot
There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones are vulnerable to improper default permissions.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. An incorrect permission vulnerability exists in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1592", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37030" } ] }, "cve": "CVE-2021-37030", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37030", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398863", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37030", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37030", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1895", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398863", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones are vulnerable to improper default permissions.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. An incorrect permission vulnerability exists in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "VULHUB", "id": "VHN-398863" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37030", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015558", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1895", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102863", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "id": "VAR-202111-1592", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398863" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.626000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172192" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37030" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398863" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "date": "2021-11-23T16:15:09.707000", "db": "NVD", "id": "CVE-2021-37030" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398863" }, { "date": "2022-11-24T06:42:00", "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "date": "2021-12-09T17:57:50.007000", "db": "NVD", "id": "CVE-2021-37030" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1895" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Default Permission Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015558" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1895" } ], "trust": 0.6 } }
var-202112-0238
Vulnerability from variot
There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart. plural Huawei A code injection vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0238", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37097" } ] }, "cve": "CVE-2021-37097", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37097", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398933", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37097", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37097", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2062", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398933", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart. plural Huawei A code injection vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "VULHUB", "id": "VHN-398933" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37097", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015868", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2062", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398933", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "id": "VAR-202112-0238", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398933" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:21.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "OOM\u00a0vulnerability\u00a0with\u00a0the\u00a0system\u00a0framework\u00a0code\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173805" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37097" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398933" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "date": "2021-12-08T15:15:10.023000", "db": "NVD", "id": "CVE-2021-37097" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-15T00:00:00", "db": "VULHUB", "id": "VHN-398933" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "date": "2021-12-15T13:47:44.103000", "db": "NVD", "id": "CVE-2021-37097" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2062" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Code injection vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2062" } ], "trust": 0.6 } }
var-202211-0874
Vulnerability from variot
The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0874", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44561" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44561" } ] }, "cve": "CVE-2022-44561", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44561", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2467", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction", "sources": [ { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "VULHUB", "id": "VHN-441951" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44561", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2467", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441951", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "id": "VAR-202211-0874", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441951" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:27.769000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214623" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "NVD", "id": "CVE-2022-44561" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44561/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441951" }, { "db": "NVD", "id": "CVE-2022-44561" }, { "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441951" }, { "date": "2022-11-09T21:15:18.863000", "db": "NVD", "id": "CVE-2022-44561" }, { "date": "2022-11-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-17T00:00:00", "db": "VULHUB", "id": "VHN-441951" }, { "date": "2022-11-17T22:20:06.457000", "db": "NVD", "id": "CVE-2022-44561" }, { "date": "2022-11-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2467" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2467" } ], "trust": 0.6 } }
var-202112-0353
Vulnerability from variot
There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. plural Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0353", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37044" } ] }, "cve": "CVE-2021-37044", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37044", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398877", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37044", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37044", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2048", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398877", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. plural Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "VULHUB", "id": "VHN-398877" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37044", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015892", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2048", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398877", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "id": "VAR-202112-0353", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398877" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:39.522000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Permission\u00a0control\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173801" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37044" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398877" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "date": "2021-12-08T15:15:09.323000", "db": "NVD", "id": "CVE-2021-37044" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398877" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "date": "2021-12-09T17:56:42.897000", "db": "NVD", "id": "CVE-2021-37044" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2048" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to improper retention of permissions in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2048" } ], "trust": 0.6 } }
var-202112-0343
Vulnerability from variot
There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei An incomplete cleanup vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. HUAWEI HarmonyOS has a resource management error vulnerability. This vulnerability is caused by a resource not closing or releasing vulnerability in a certain component of HarmonyOS. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0343", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37092" } ] }, "cve": "CVE-2021-37092", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37092", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398928", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37092", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37092", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2038", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398928", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei An incomplete cleanup vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. HUAWEI HarmonyOS has a resource management error vulnerability. This vulnerability is caused by a resource not closing or releasing vulnerability in a certain component of HarmonyOS. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "VULHUB", "id": "VHN-398928" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37092", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015866", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2038", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08328", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398928", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "id": "VAR-202112-0343", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398928" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.189000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Memory\u00a0leakage\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37092" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398928" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "date": "2021-12-08T15:15:09.920000", "db": "NVD", "id": "CVE-2021-37092" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398928" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "date": "2021-12-09T17:59:00.210000", "db": "NVD", "id": "CVE-2021-37092" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Incomplete Cleanup Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2038" } ], "trust": 0.6 } }
var-202110-1489
Vulnerability from variot
There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1489", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36986" } ] }, "cve": "CVE-2021-36986", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36986", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398818", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36986", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36986", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2083", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398818", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "VULHUB", "id": "VHN-398818" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36986", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014308", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2083", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398818", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "id": "VAR-202110-1489", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398818" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:41.878000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36986", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171589" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36986" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398818" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "date": "2021-10-28T13:15:10.400000", "db": "NVD", "id": "CVE-2021-36986" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398818" }, { "date": "2022-10-12T08:23:00", "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-36986" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2083" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014308" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2083" } ], "trust": 0.6 } }
var-202110-1496
Vulnerability from variot
There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality. Huawei There is an unspecified vulnerability in the device.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1496", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22485" } ] }, "cve": "CVE-2021-22485", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22485", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380920", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22485", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22485", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2075", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380920", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380920" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality. Huawei There is an unspecified vulnerability in the device.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "VULHUB", "id": "VHN-380920" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22485", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014315", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2075", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380920", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380920" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "id": "VAR-202110-1496", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380920" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:07.276000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22485", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171571" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22485" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380920" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380920" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380920" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "date": "2021-10-28T13:15:10.103000", "db": "NVD", "id": "CVE-2021-22485" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380920" }, { "date": "2022-10-12T08:43:00", "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "date": "2021-11-01T23:54:36.053000", "db": "NVD", "id": "CVE-2021-22485" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2075" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014315" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2075" } ], "trust": 0.6 } }
var-202106-1930
Vulnerability from variot
There is a Business Logic Errors vulnerability in Huawei Smartphone. The malicious apps installed on the device can keep taking screenshots in the background. This issue does not cause system errors, but may cause personal information leakage. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1930", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22308" } ] }, "cve": "CVE-2021-22308", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22308", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380743", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22308", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22308", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202106-230", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380743", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380743" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Business Logic Errors vulnerability in Huawei Smartphone. The malicious apps installed on the device can keep taking screenshots in the background. This issue does not cause system errors, but may cause personal information leakage. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "VULHUB", "id": "VHN-380743" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22308", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007562", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-230", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380743", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380743" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "id": "VAR-202106-1930", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380743" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:31.146000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "title": "Repair measures for vulnerabilities in processing logic errors in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153892" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22308" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380743" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380743" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380743" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "date": "2021-06-03T16:15:10.753000", "db": "NVD", "id": "CVE-2021-22308" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380743" }, { "date": "2022-02-17T05:09:00", "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22308" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-230" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007562" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-230" } ], "trust": 0.6 } }
var-202107-1678
Vulnerability from variot
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1678", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22432" } ] }, "cve": "CVE-2021-22432", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22432", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380867", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22432", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22432", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2227", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380867", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22432", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22432", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018743", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2227", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380867", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22432", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "id": "VAR-202107-1678", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380867" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T23:03:43.314000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172010" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22432" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22432/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380867" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22432" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "date": "2022-02-25T19:15:10.007000", "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380867" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22432" }, { "date": "2023-07-06T01:42:00", "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "date": "2022-03-07T17:58:26.287000", "db": "NVD", "id": "CVE-2021-22432" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2227" } ], "trust": 0.6 } }
var-202107-1683
Vulnerability from variot
There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1683", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22434" } ] }, "cve": "CVE-2021-22434", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22434", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380869", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22434", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22434", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2222", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380869", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22434", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22434", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018741", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2222", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380869", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22434", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "id": "VAR-202107-1683", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380869" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T22:56:28.352000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171984" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22434" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22434/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380869" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22434" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "date": "2022-02-25T19:15:10.317000", "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380869" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22434" }, { "date": "2023-07-06T01:37:00", "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "date": "2022-03-07T18:46:17.363000", "db": "NVD", "id": "CVE-2021-22434" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2222" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2222" } ], "trust": 0.6 } }
var-202112-0347
Vulnerability from variot
There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37053" } ] }, "cve": "CVE-2021-37053", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37053", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398886", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37053", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37053", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2046", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398886", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "VULHUB", "id": "VHN-398886" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37053", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015861", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2046", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398886", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "id": "VAR-202112-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398886" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.228000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173799" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37053" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398886" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "date": "2021-12-08T15:15:09.647000", "db": "NVD", "id": "CVE-2021-37053" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398886" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "date": "2021-12-09T17:55:28.810000", "db": "NVD", "id": "CVE-2021-37053" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2046" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2046" } ], "trust": 0.6 } }
var-202110-1443
Vulnerability from variot
There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1443", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22407" } ] }, "cve": "CVE-2021-22407", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22407", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380842", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22407", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22407", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2038", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380842", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380842" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "VULHUB", "id": "VHN-380842" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22407", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014284", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2038", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380842", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380842" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "id": "VAR-202110-1443", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380842" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:23Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Fixes for configuration error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168194" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22407" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380842" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380842" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380842" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "date": "2021-10-28T13:15:08.730000", "db": "NVD", "id": "CVE-2021-22407" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380842" }, { "date": "2022-10-12T02:04:00", "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "date": "2021-11-01T19:41:11.663000", "db": "NVD", "id": "CVE-2021-22407" }, { "date": "2021-11-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014284" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2038" } ], "trust": 0.6 } }
var-202106-0593
Vulnerability from variot
There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0593", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22369" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22369" } ] }, "cve": "CVE-2021-22369", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-380804", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2021-22369", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22369", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1990", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380804", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22369", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" }, { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22369", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1990", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380804", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22369", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" }, { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "id": "VAR-202106-0593", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380804" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:32.707000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156073" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-367", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "NVD", "id": "CVE-2021-22369" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22369" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/367.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" }, { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" }, { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380804" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22369" }, { "date": "2021-06-30T15:15:10.380000", "db": "NVD", "id": "CVE-2021-22369" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380804" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22369" }, { "date": "2021-07-06T14:58:00.257000", "db": "NVD", "id": "CVE-2021-22369" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1990" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1990" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1990" } ], "trust": 0.6 } }
var-202106-0609
Vulnerability from variot
There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to the disclosure of user habits. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There are security vulnerabilities in several Huawei SmartPhone, which stems from the lack of effective permissions and access control measures in the products. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0609", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22346" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22346" } ] }, "cve": "CVE-2021-22346", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380781", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22346", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22346", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-2006", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380781", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22346", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" }, { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to the disclosure of user habits. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There are security vulnerabilities in several Huawei SmartPhone, which stems from the lack of effective permissions and access control measures in the products. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22346", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2006", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380781", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22346", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" }, { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "id": "VAR-202106-0609", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380781" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:11.559000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156084" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "NVD", "id": "CVE-2021-22346" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22346" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" }, { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" }, { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380781" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22346" }, { "date": "2021-06-30T21:15:09.717000", "db": "NVD", "id": "CVE-2021-22346" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380781" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22346" }, { "date": "2021-07-06T18:09:38.953000", "db": "NVD", "id": "CVE-2021-22346" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2006" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2006" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2006" } ], "trust": 0.6 } }
var-202108-2286
Vulnerability from variot
There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration. EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2286", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22394" } ] }, "cve": "CVE-2021-22394", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22394", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380829", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22394", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22394", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-2828", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380829", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration. EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "VULHUB", "id": "VHN-380829" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22394", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2828", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380829", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "id": "VAR-202108-2286", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380829" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:25.437000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172031" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22394" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22394/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380829" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "date": "2022-02-25T19:15:08.927000", "db": "NVD", "id": "CVE-2021-22394" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380829" }, { "date": "2023-06-30T08:30:00", "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "date": "2022-03-07T17:39:01.157000", "db": "NVD", "id": "CVE-2021-22394" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2828" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2828" } ], "trust": 0.6 } }
var-202110-1491
Vulnerability from variot
There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1491", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22491" } ] }, "cve": "CVE-2021-22491", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22491", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380926", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22491", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22491", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2081", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380926", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "VULHUB", "id": "VHN-380926" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22491", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014310", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2081", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380926", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "id": "VAR-202110-1491", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380926" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:42.920000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22491", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168220" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22491" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380926" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "date": "2021-10-28T13:15:10.307000", "db": "NVD", "id": "CVE-2021-22491" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380926" }, { "date": "2022-10-12T08:30:00", "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "date": "2021-11-01T23:25:32.877000", "db": "NVD", "id": "CVE-2021-22491" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2081" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014310" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2081" } ], "trust": 0.6 } }
var-202101-0998
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in some Huawei Smartphone, Successful exploit of this vulnerability can cause process exceptions during updating. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0998", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9138" } ] }, "cve": "CVE-2020-9138", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9138", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-187263", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9138", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9138", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202101-1043", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187263", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in some Huawei Smartphone, Successful exploit of this vulnerability can cause process exceptions during updating. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "VULHUB", "id": "VHN-187263" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9138", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015440", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1043", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187263", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "id": "VAR-202101-0998", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187263" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:56:01.694000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139432" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9138" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187263" }, { "date": "2021-09-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "date": "2021-01-13T22:15:13.880000", "db": "NVD", "id": "CVE-2020-9138" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-187263" }, { "date": "2021-09-22T09:11:00", "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "date": "2021-01-19T15:03:46.657000", "db": "NVD", "id": "CVE-2020-9138" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1043" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding out-of-bounds writing on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015440" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1043" } ], "trust": 0.6 } }
var-202111-1766
Vulnerability from variot
There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource initialization vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1766", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39966" } ] }, "cve": "CVE-2021-39966", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39966", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401367", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39966", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39966", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2134", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401367", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource initialization vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39966", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017615", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2134", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14783", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401367", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39966", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "id": "VAR-202111-1766", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401367" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:25.235000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-909", "trust": 1.1 }, { "problemtype": "Inadequate resource initialization (CWE-909) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39966" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401367" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39966" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "date": "2022-01-03T22:15:09.957000", "db": "NVD", "id": "CVE-2021-39966" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401367" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39966" }, { "date": "2023-01-27T07:28:00", "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "date": "2022-01-13T16:22:11.833000", "db": "NVD", "id": "CVE-2021-39966" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2134" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to insufficient initialization of resources in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2134" } ], "trust": 0.6 } }
var-202108-2196
Vulnerability from variot
There is an Integer Underflow (Wrap or Wraparound) Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS of Samgr
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2196", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22379" } ] }, "cve": "CVE-2021-22379", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22379", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380814", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22379", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22379", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-097", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380814", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22379", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Underflow (Wrap or Wraparound) Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS of Samgr", "sources": [ { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22379", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010876", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-097", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380814", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22379", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "id": "VAR-202108-2196", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380814" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:19.249000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22379", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Fixes for digital error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159074" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-191", "trust": 1.1 }, { "problemtype": "Integer underflow (CWE-191) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22379" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/191.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380814" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22379" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "date": "2021-08-02T17:15:13.617000", "db": "NVD", "id": "CVE-2021-22379" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380814" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22379" }, { "date": "2022-07-11T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "date": "2021-12-09T17:55:10.127000", "db": "NVD", "id": "CVE-2021-22379" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-097" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 smartphone \u00a0 Integer underflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010876" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-097" } ], "trust": 0.6 } }
var-202110-1856
Vulnerability from variot
There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion. Huawei Smartphone products are vulnerable to resource allocation without limits or throttling.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1856", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37111" } ] }, "cve": "CVE-2021-37111", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37111", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398947", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37111", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37111", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2225", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398947", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion. Huawei Smartphone products are vulnerable to resource allocation without limits or throttling.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37111", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017379", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2225", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398947", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37111", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "id": "VAR-202110-1856", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398947" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:18.682000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176773" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.1 }, { "problemtype": "Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37111" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398947" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37111" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "date": "2022-01-03T22:15:09.057000", "db": "NVD", "id": "CVE-2021-37111" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398947" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37111" }, { "date": "2023-01-17T07:04:00", "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "date": "2022-01-11T19:31:32.390000", "db": "NVD", "id": "CVE-2021-37111" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2225" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in resource allocation without limits or throttling in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2225" } ], "trust": 0.6 } }
var-202112-0342
Vulnerability from variot
There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product that does not effectively authenticate user identities. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0342", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37093" } ] }, "cve": "CVE-2021-37093", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37093", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398929", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37093", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37093", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2028", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398929", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product that does not effectively authenticate user identities. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "VULHUB", "id": "VHN-398929" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37093", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015867", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2028", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08327", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398929", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "id": "VAR-202112-0342", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398929" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:21.280000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Improper\u00a0access\u00a0control\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173791" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37093" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398929" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "date": "2021-12-08T15:15:09.973000", "db": "NVD", "id": "CVE-2021-37093" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398929" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37093" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2028" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2028" } ], "trust": 0.6 } }
var-202209-0585
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0585", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38997" } ] }, "cve": "CVE-2022-38997", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38997", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38997", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-173", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "VULHUB", "id": "VHN-434768" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38997", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016782", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-173", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434768", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "id": "VAR-202209-0585", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434768" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:39.410000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208081" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38997" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38997/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434768" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "date": "2022-09-16T18:15:17.820000", "db": "NVD", "id": "CVE-2022-38997" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-434768" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "date": "2022-09-17T03:47:48.817000", "db": "NVD", "id": "CVE-2022-38997" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ], "trust": 0.6 } }
var-202211-1051
Vulnerability from variot
The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1051", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" } ] }, "cve": "CVE-2022-44554", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44554", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2127", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device", "sources": [ { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "VULHUB", "id": "VHN-441941" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44554", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2127", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441941", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441941" }, { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "id": "VAR-202211-1051", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441941" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:47.728000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214355" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44554" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44554/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441941" }, { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441941" }, { "db": "NVD", "id": "CVE-2022-44554" }, { "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441941" }, { "date": "2022-11-09T21:15:18.503000", "db": "NVD", "id": "CVE-2022-44554" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441941" }, { "date": "2022-11-14T19:13:19.993000", "db": "NVD", "id": "CVE-2022-44554" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2127" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2127" } ], "trust": 0.6 } }
var-202210-0125
Vulnerability from variot
The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0125", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46839" } ] }, "cve": "CVE-2021-46839", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46839", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46839", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-170", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "VULHUB", "id": "VHN-430150" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46839", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-019228", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-170", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430150", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "id": "VAR-202210-0125", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430150" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:30.187000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211152" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46839" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46839/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430150" }, { "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "db": "NVD", "id": "CVE-2021-46839" }, { "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-430150" }, { "date": "2023-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "date": "2022-10-14T16:15:11.920000", "db": "NVD", "id": "CVE-2021-46839" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-430150" }, { "date": "2023-10-24T08:20:00", "db": "JVNDB", "id": "JVNDB-2022-019228" }, { "date": "2022-10-18T14:50:26.943000", "db": "NVD", "id": "CVE-2021-46839" }, { "date": "2022-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-170" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-170" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019228" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-170" } ], "trust": 0.6 } }
var-202110-1494
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei Smartphone is a smartphone of China's Huawei (Huawei) company.
A buffer overflow vulnerability exists in many Huawei devices, which is caused by an out-of-bounds read error in the product
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1494", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22487" } ] }, "cve": "CVE-2021-22487", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22487", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-84230", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380922", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22487", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22487", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2021-84230", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2077", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380922", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei Smartphone is a smartphone of China\u0027s Huawei (Huawei) company. \n\r\n\r\nA buffer overflow vulnerability exists in many Huawei devices, which is caused by an out-of-bounds read error in the product", "sources": [ { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22487", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-014313", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-84230", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202110-2077", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380922", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "id": "VAR-202110-1494", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" } ] }, "last_update_date": "2023-12-18T13:22:41.660000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22487", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Patch for Huawei Smartphone Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/296746" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168217" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22487" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "CNVD", "id": "CNVD-2021-84230" }, { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380922" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "date": "2021-10-28T13:15:10.187000", "db": "NVD", "id": "CVE-2021-22487" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "CNVD", "id": "CNVD-2021-84230" }, { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380922" }, { "date": "2022-10-12T08:39:00", "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "date": "2021-11-01T23:44:22.897000", "db": "NVD", "id": "CVE-2021-22487" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2077" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014313" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2077" } ], "trust": 0.6 } }
var-202104-1919
Vulnerability from variot
A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers may exploit this vulnerability by carefully constructing attack scenarios to cause out-of-bounds read. Huawei A classic buffer overflow vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1919", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9147" } ] }, "cve": "CVE-2020-9147", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9147", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-187272", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9147", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9147", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-026", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-187272", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-9147", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers may exploit this vulnerability by carefully constructing attack scenarios to cause out-of-bounds read. Huawei A classic buffer overflow vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9147", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-016439", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202104-026", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187272", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9147", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "id": "VAR-202104-1919", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187272" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:47:09.802000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0 Security update \u00a02021 Year 1 Moon", "trust": 0.8, "url": "https://consumer.huawei.com/jp/support/bulletin/2021/1/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146444" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-120", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9147" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-01T00:00:00", "db": "VULHUB", "id": "VHN-187272" }, { "date": "2021-04-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9147" }, { "date": "2021-12-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "date": "2021-04-01T18:15:12.417000", "db": "NVD", "id": "CVE-2020-9147" }, { "date": "2021-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-187272" }, { "date": "2021-04-05T00:00:00", "db": "VULMON", "id": "CVE-2020-9147" }, { "date": "2021-12-03T09:05:00", "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2020-9147" }, { "date": "2021-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-026" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Classic buffer overflow vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016439" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-026" } ], "trust": 0.6 } }
var-202209-0453
Vulnerability from variot
The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a buffer overflow vulnerability in HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0453", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40017" } ] }, "cve": "CVE-2021-40017", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40017", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40017", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-168", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a buffer overflow vulnerability in HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40017", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-020317", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-168", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-64981", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401418", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40017", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "id": "VAR-202209-0453", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401418" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.409000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208408" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40017" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40017/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401418" }, { "db": "VULMON", "id": "CVE-2021-40017" }, { "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "db": "NVD", "id": "CVE-2021-40017" }, { "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-401418" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40017" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "date": "2022-09-16T18:15:11.457000", "db": "NVD", "id": "CVE-2021-40017" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-401418" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40017" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-020317" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-40017" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-168" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-168" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020317" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-168" } ], "trust": 0.6 } }
var-202212-0768
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0768", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46324" } ] }, "cve": "CVE-2022-46324", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46324", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46324", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2520", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "VULHUB", "id": "VHN-444294" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46324", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024019", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2520", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444294", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "id": "VAR-202212-0768", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444294" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:31.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218961" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46324" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46324/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444294" }, { "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "db": "NVD", "id": "CVE-2022-46324" }, { "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444294" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "date": "2022-12-20T21:15:11.837000", "db": "NVD", "id": "CVE-2022-46324" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444294" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024019" }, { "date": "2022-12-24T04:17:48.310000", "db": "NVD", "id": "CVE-2022-46324" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2520" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2520" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024019" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2520" } ], "trust": 0.6 } }
var-202302-0433
Vulnerability from variot
The multi-screen collaboration module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0433", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48286" } ] }, "cve": "CVE-2022-48286", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48286", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48286", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-348", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-screen collaboration module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48286", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003370", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-348", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453366", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48286", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "id": "VAR-202302-0433", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453366" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:18.704000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225749" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48286 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48286" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48286/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48286" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453366" }, { "db": "VULMON", "id": "CVE-2022-48286" }, { "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "db": "NVD", "id": "CVE-2022-48286" }, { "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453366" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48286" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "date": "2023-02-09T17:15:12.237000", "db": "NVD", "id": "CVE-2022-48286" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453366" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48286" }, { "date": "2023-09-07T01:16:00", "db": "JVNDB", "id": "JVNDB-2023-003370" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48286" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-348" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-348" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003370" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-348" } ], "trust": 0.6 } }
var-202212-0384
Vulnerability from variot
The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0384", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46318" } ] }, "cve": "CVE-2022-46318", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46318", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46318", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202212-2482", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "VULHUB", "id": "VHN-444288" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46318", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024013", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2482", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444288", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444288" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "id": "VAR-202212-0384", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444288" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:35.642000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218472" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46318" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46318/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444288" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444288" }, { "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "db": "NVD", "id": "CVE-2022-46318" }, { "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444288" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "date": "2022-12-20T21:15:11.547000", "db": "NVD", "id": "CVE-2022-46318" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444288" }, { "date": "2023-12-01T02:32:00", "db": "JVNDB", "id": "JVNDB-2022-024013" }, { "date": "2022-12-24T04:15:49.883000", "db": "NVD", "id": "CVE-2022-46318" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2482" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2482" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024013" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2482" } ], "trust": 0.6 } }
var-202210-0209
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0209", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41597" } ] }, "cve": "CVE-2022-41597", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41597", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41597", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-154", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "VULHUB", "id": "VHN-437838" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41597", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018790", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-154", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437838", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "id": "VAR-202210-0209", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437838" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:10.366000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210788" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41597" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41597/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437838" }, { "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "db": "NVD", "id": "CVE-2022-41597" }, { "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437838" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "date": "2022-10-14T16:15:28.067000", "db": "NVD", "id": "CVE-2022-41597" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437838" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018790" }, { "date": "2022-10-15T01:55:30.273000", "db": "NVD", "id": "CVE-2022-41597" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-154" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-154" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018790" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-154" } ], "trust": 0.6 } }
var-202210-1040
Vulnerability from variot
Uncaptured exceptions in the home screen module. Successful exploitation of this vulnerability may affect stability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-1040", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41587" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41587" } ] }, "cve": "CVE-2022-41587", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41587", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202210-951", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41587" }, { "db": "CNNVD", "id": "CNNVD-202210-951" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Uncaptured exceptions in the home screen module. Successful exploitation of this vulnerability may affect stability", "sources": [ { "db": "NVD", "id": "CVE-2022-41587" }, { "db": "VULHUB", "id": "VHN-437820" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41587", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-951", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437820", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437820" }, { "db": "NVD", "id": "CVE-2022-41587" }, { "db": "CNNVD", "id": "CNNVD-202210-951" } ] }, "id": "VAR-202210-1040", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437820" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:52.494000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211184" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-951" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-754", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437820" }, { "db": "NVD", "id": "CVE-2022-41587" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41587/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437820" }, { "db": "NVD", "id": "CVE-2022-41587" }, { "db": "CNNVD", "id": "CNNVD-202210-951" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437820" }, { "db": "NVD", "id": "CVE-2022-41587" }, { "db": "CNNVD", "id": "CNNVD-202210-951" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437820" }, { "date": "2022-10-14T16:15:24.800000", "db": "NVD", "id": "CVE-2022-41587" }, { "date": "2022-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-951" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437820" }, { "date": "2022-10-18T17:12:48.847000", "db": "NVD", "id": "CVE-2022-41587" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-951" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-951" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei EMUI Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-951" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-951" } ], "trust": 0.6 } }
var-202210-0286
Vulnerability from variot
The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0286", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41580" } ] }, "cve": "CVE-2022-41580", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41580", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41580", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-169", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "VULHUB", "id": "VHN-437809" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41580", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018740", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-169", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437809", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "id": "VAR-202210-0286", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437809" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:42.645000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211151" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41580" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41580/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437809" }, { "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "db": "NVD", "id": "CVE-2022-41580" }, { "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437809" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "date": "2022-10-14T16:15:21.433000", "db": "NVD", "id": "CVE-2022-41580" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437809" }, { "date": "2023-10-23T06:24:00", "db": "JVNDB", "id": "JVNDB-2022-018740" }, { "date": "2022-10-18T14:49:52.020000", "db": "NVD", "id": "CVE-2022-41580" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-169" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-169" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018740" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-169" } ], "trust": 0.6 } }
var-202211-0328
Vulnerability from variot
The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0328", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44558" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44558" } ] }, "cve": "CVE-2022-44558", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44558", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2123", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "VULHUB", "id": "VHN-441946" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44558", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2123", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441946", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "id": "VAR-202211-0328", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441946" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:28.205000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214353" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "NVD", "id": "CVE-2022-44558" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44558" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44558/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441946" }, { "db": "NVD", "id": "CVE-2022-44558" }, { "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441946" }, { "date": "2022-11-09T21:15:18.670000", "db": "NVD", "id": "CVE-2022-44558" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441946" }, { "date": "2022-11-14T19:09:40.857000", "db": "NVD", "id": "CVE-2022-44558" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2123" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2123" } ], "trust": 0.6 } }
var-202208-0445
Vulnerability from variot
The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by a flaw introduced in the design process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0445", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40030" } ] }, "cve": "CVE-2021-40030", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40030", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40030", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2395", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by a flaw introduced in the design process", "sources": [ { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "VULHUB", "id": "VHN-401431" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40030", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020148", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2395", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "id": "VAR-202208-0445", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401431" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:47.937000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204203" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40030" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40030/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401431" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "date": "2022-08-10T20:15:22.347000", "db": "NVD", "id": "CVE-2021-40030" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-401431" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "date": "2022-08-12T21:20:01.687000", "db": "NVD", "id": "CVE-2021-40030" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ], "trust": 0.6 } }
var-202209-0201
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0201", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38990" } ] }, "cve": "CVE-2022-38990", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38990", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38990", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-206", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "VULHUB", "id": "VHN-428491" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38990", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016789", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-206", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428491", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "id": "VAR-202209-0201", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428491" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.630000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208096" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38990" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38990/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428491" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "date": "2022-09-16T18:15:17.553000", "db": "NVD", "id": "CVE-2022-38990" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428491" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "date": "2022-09-17T03:45:28.350000", "db": "NVD", "id": "CVE-2022-38990" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ], "trust": 0.6 } }
var-202212-0557
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0557", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46323" } ] }, "cve": "CVE-2022-46323", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46323", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46323", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2524", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "VULHUB", "id": "VHN-444293" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46323", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024020", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2524", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444293", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "id": "VAR-202212-0557", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444293" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:44.509000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218962" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46323" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46323/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444293" }, { "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "db": "NVD", "id": "CVE-2022-46323" }, { "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444293" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "date": "2022-12-20T21:15:11.787000", "db": "NVD", "id": "CVE-2022-46323" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444293" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024020" }, { "date": "2022-12-24T04:17:37.283000", "db": "NVD", "id": "CVE-2022-46323" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2524" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2524" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024020" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2524" } ], "trust": 0.6 } }
var-202209-0199
Vulnerability from variot
The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps. Huawei of EMUI and HarmonyOS There is a vulnerability in deserialization of untrusted data.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS versions prior to 2.0 have a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0199", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39008" } ] }, "cve": "CVE-2022-39008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39008", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39008", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-219", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps. Huawei of EMUI and HarmonyOS There is a vulnerability in deserialization of untrusted data.Information may be obtained and information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS versions prior to 2.0 have a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39008", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-219", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64980", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428483", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39008", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "id": "VAR-202209-0199", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428483" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:42.315000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208618" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39008" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39008/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428483" }, { "db": "VULMON", "id": "CVE-2022-39008" }, { "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "db": "NVD", "id": "CVE-2022-39008" }, { "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428483" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39008" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "date": "2022-09-16T18:15:18.210000", "db": "NVD", "id": "CVE-2022-39008" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428483" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39008" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017586" }, { "date": "2022-09-21T13:55:35.557000", "db": "NVD", "id": "CVE-2022-39008" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-219" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-219" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Untrusted Data Deserialization Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-219" } ], "trust": 0.6 } }
var-202210-0284
Vulnerability from variot
The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0284", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41576" } ] }, "cve": "CVE-2022-41576", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41576", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41576", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-177", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "VULHUB", "id": "VHN-437801" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41576", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018796", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-177", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437801", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437801" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "id": "VAR-202210-0284", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437801" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:51.329000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210795" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41576" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41576/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437801" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437801" }, { "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "db": "NVD", "id": "CVE-2022-41576" }, { "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437801" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "date": "2022-10-14T16:15:20.110000", "db": "NVD", "id": "CVE-2022-41576" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437801" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018796" }, { "date": "2022-10-15T01:50:36.447000", "db": "NVD", "id": "CVE-2022-41576" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-177" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-177" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018796" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-177" } ], "trust": 0.6 } }
var-202108-2198
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2198", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22438" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22438" } ] }, "cve": "CVE-2021-22438", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22438", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22438", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-126", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380873", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22438", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" }, { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone", "sources": [ { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22438", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-126", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380873", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22438", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" }, { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "id": "VAR-202108-2198", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380873" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:29.647000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159080" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "NVD", "id": "CVE-2021-22438" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22438" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" }, { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" }, { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380873" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22438" }, { "date": "2021-08-02T17:15:14.520000", "db": "NVD", "id": "CVE-2021-22438" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380873" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22438" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22438" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-126" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-126" } ], "trust": 0.6 } }
var-202209-0140
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0140", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38988" } ] }, "cve": "CVE-2022-38988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38988", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38988", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-193", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "VULHUB", "id": "VHN-428500" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38988", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016791", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-193", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428500", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "id": "VAR-202209-0140", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428500" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:21.546000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208089" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38988" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38988/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428500" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "date": "2022-09-16T18:15:17.477000", "db": "NVD", "id": "CVE-2022-38988" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428500" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "date": "2022-09-17T03:46:28.717000", "db": "NVD", "id": "CVE-2022-38988" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ], "trust": 0.6 } }
var-202209-0452
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0452", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38991" } ] }, "cve": "CVE-2022-38991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38991", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38991", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-185", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "VULHUB", "id": "VHN-428507" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38991", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016788", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-185", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428507", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "id": "VAR-202209-0452", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428507" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:12.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208087" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38991" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38991/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428507" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "date": "2022-09-16T18:15:17.590000", "db": "NVD", "id": "CVE-2022-38991" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428507" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "date": "2022-09-17T03:46:16.633000", "db": "NVD", "id": "CVE-2022-38991" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ], "trust": 0.6 } }
var-202205-0341
Vulnerability from variot
The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0341", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29790" } ] }, "cve": "CVE-2022-29790", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29790", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421299", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29790", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29790", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2549", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421299", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-29790", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29790", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009631", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2549", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-57611", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421299", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29790", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "id": "VAR-202205-0341", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421299" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:17.963000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193770" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29790" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29790/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421299" }, { "db": "VULMON", "id": "CVE-2022-29790" }, { "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "db": "NVD", "id": "CVE-2022-29790" }, { "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29790" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "date": "2022-05-13T15:15:09.790000", "db": "NVD", "id": "CVE-2022-29790" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421299" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2022-29790" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009631" }, { "date": "2022-05-23T18:42:44.167000", "db": "NVD", "id": "CVE-2022-29790" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2549" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2549" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009631" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2549" } ], "trust": 0.6 } }
var-202205-0249
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0249", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29791" } ] }, "cve": "CVE-2022-29791", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29791", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421300", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29791", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29791", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2546", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421300", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29791", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009630", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2546", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53575", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421300", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29791", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "id": "VAR-202205-0249", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421300" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:30.380000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193767" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29791" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29791/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421300" }, { "db": "VULMON", "id": "CVE-2022-29791" }, { "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "db": "NVD", "id": "CVE-2022-29791" }, { "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421300" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29791" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "date": "2022-05-13T15:15:09.837000", "db": "NVD", "id": "CVE-2022-29791" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421300" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29791" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009630" }, { "date": "2022-05-23T18:42:20.940000", "db": "NVD", "id": "CVE-2022-29791" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2546" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2546" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009630" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2546" } ], "trust": 0.6 } }
var-202106-0596
Vulnerability from variot
There is a Security Features Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0596", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22372" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22372" } ] }, "cve": "CVE-2021-22372", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380807", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22372", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22372", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1983", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380807", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22372", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" }, { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Security Features Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22372", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1983", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380807", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22372", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" }, { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "id": "VAR-202106-0596", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380807" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:32.250000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156067" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22372" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" }, { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" }, { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380807" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22372" }, { "date": "2021-06-30T14:15:08.623000", "db": "NVD", "id": "CVE-2021-22372" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380807" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22372" }, { "date": "2021-07-06T15:22:47.827000", "db": "NVD", "id": "CVE-2021-22372" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1983" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1983" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1983" } ], "trust": 0.6 } }
var-202110-1488
Vulnerability from variot
There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart. Huawei Smartphones contain a race condition vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1488", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36987" } ] }, "cve": "CVE-2021-36987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36987", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398819", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36987", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36987", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2086", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398819", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart. Huawei Smartphones contain a race condition vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "VULHUB", "id": "VHN-398819" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36987", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014307", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2086", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398819", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "id": "VAR-202110-1488", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398819" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:05.563000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36987", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171602" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36987" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398819" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "date": "2021-10-28T13:15:10.443000", "db": "NVD", "id": "CVE-2021-36987" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398819" }, { "date": "2022-10-12T08:22:00", "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "date": "2021-11-01T23:14:51.270000", "db": "NVD", "id": "CVE-2021-36987" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2086" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014307" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2086" } ], "trust": 0.6 } }
var-202203-0976
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0976", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40064" } ] }, "cve": "CVE-2021-40064", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40064", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401465", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40064", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40064", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-971", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401465", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "VULHUB", "id": "VHN-401465" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40064", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018700", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-971", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401465", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "id": "VAR-202203-0976", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401465" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:15.763000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186004" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40064" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40064/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401465" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "date": "2022-03-10T17:43:24.960000", "db": "NVD", "id": "CVE-2021-40064" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401465" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "date": "2022-03-14T16:17:26.763000", "db": "NVD", "id": "CVE-2021-40064" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018700" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ], "trust": 0.6 } }
var-202112-0345
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0345", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37069" } ] }, "cve": "CVE-2021-37069", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37069", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398903", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37069", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37069", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2033", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398903", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "VULHUB", "id": "VHN-398903" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37069", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015863", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2033", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398903", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "id": "VAR-202112-0345", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398903" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.164000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Race\u00a0condition\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173792" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37069" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398903" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "date": "2021-12-08T15:15:09.757000", "db": "NVD", "id": "CVE-2021-37069" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398903" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "date": "2021-12-09T17:56:13.047000", "db": "NVD", "id": "CVE-2021-37069" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2033" } ], "trust": 0.6 } }
var-202210-0127
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0127", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41593" } ] }, "cve": "CVE-2022-41593", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41593", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41593", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-157", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "VULHUB", "id": "VHN-437831" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41593", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018793", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-157", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437831", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "id": "VAR-202210-0127", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437831" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:10.438000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210791" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41593" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41593/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437831" }, { "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "db": "NVD", "id": "CVE-2022-41593" }, { "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437831" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "date": "2022-10-14T16:15:26.613000", "db": "NVD", "id": "CVE-2022-41593" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437831" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018793" }, { "date": "2022-10-15T01:52:41.003000", "db": "NVD", "id": "CVE-2022-41593" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-157" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-157" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018793" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-157" } ], "trust": 0.6 } }
var-202301-0512
Vulnerability from variot
The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability. EMUI and HarmonyOS contains a double free vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0512", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-47975" } ] }, "cve": "CVE-2022-47975", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-47975", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-47975", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-436", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability. EMUI and HarmonyOS contains a double free vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-47975", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001767", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-436", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449903", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-47975", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "id": "VAR-202301-0512", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449903" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:21.183000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02023", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221313" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-47975" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-47975/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449903" }, { "db": "VULMON", "id": "CVE-2022-47975" }, { "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "db": "NVD", "id": "CVE-2022-47975" }, { "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449903" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-47975" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "date": "2023-01-06T20:15:09.880000", "db": "NVD", "id": "CVE-2022-47975" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-449903" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-47975" }, { "date": "2023-05-09T01:35:00", "db": "JVNDB", "id": "JVNDB-2023-001767" }, { "date": "2023-02-09T17:15:11.837000", "db": "NVD", "id": "CVE-2022-47975" }, { "date": "2023-02-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-436" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-436" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Double release vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001767" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-436" } ], "trust": 0.6 } }
var-202206-0120
Vulnerability from variot
The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0120", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31757" } ] }, "cve": "CVE-2022-31757", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31757", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423590", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31757", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31757", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-470", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423590", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31757", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012034", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-470", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66174", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423590", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31757", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "id": "VAR-202206-0120", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423590" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:05.452000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198078" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31757" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31757/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423590" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31757" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "date": "2022-06-13T16:15:08.723000", "db": "NVD", "id": "CVE-2022-31757" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423590" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31757" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "date": "2022-06-27T16:14:54.070000", "db": "NVD", "id": "CVE-2022-31757" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ], "trust": 0.6 } }
var-202301-0614
Vulnerability from variot
The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0614", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46868" } ] }, "cve": "CVE-2021-46868", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46868", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46868", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-438", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46868", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001771", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-438", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449873", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46868", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "id": "VAR-202301-0614", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449873" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:01.323000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221315" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46868" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46868/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449873" }, { "db": "VULMON", "id": "CVE-2021-46868" }, { "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "db": "NVD", "id": "CVE-2021-46868" }, { "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449873" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2021-46868" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "date": "2023-01-06T20:15:09.637000", "db": "NVD", "id": "CVE-2021-46868" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449873" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2021-46868" }, { "date": "2023-05-09T01:58:00", "db": "JVNDB", "id": "JVNDB-2023-001771" }, { "date": "2023-01-12T14:31:11.530000", "db": "NVD", "id": "CVE-2021-46868" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-438" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-438" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001771" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-438" } ], "trust": 0.6 } }
var-202209-0121
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0121", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38993" } ] }, "cve": "CVE-2022-38993", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38993", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38993", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-205", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "VULHUB", "id": "VHN-428492" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38993", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016786", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-205", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428492", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "id": "VAR-202209-0121", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428492" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:40.015000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208095" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38993" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38993/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428492" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "date": "2022-09-16T18:15:17.667000", "db": "NVD", "id": "CVE-2022-38993" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428492" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "date": "2022-09-17T03:11:51.240000", "db": "NVD", "id": "CVE-2022-38993" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ], "trust": 0.6 } }
var-202207-0143
Vulnerability from variot
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0143", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34736" } ] }, "cve": "CVE-2022-34736", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34736", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427077", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34736", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34736", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-419", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427077", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-34736", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34736", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013204", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-419", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-61609", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427077", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34736", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "id": "VAR-202207-0143", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427077" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:57.301000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200890" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34736" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34736/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427077" }, { "db": "VULMON", "id": "CVE-2022-34736" }, { "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "db": "NVD", "id": "CVE-2022-34736" }, { "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427077" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34736" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "date": "2022-07-12T14:15:19.300000", "db": "NVD", "id": "CVE-2022-34736" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427077" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34736" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013204" }, { "date": "2022-07-19T12:00:18", "db": "NVD", "id": "CVE-2022-34736" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-419" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-419" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013204" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-419" } ], "trust": 0.6 } }
var-202205-0250
Vulnerability from variot
There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to cause a denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0250", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29793" } ] }, "cve": "CVE-2022-29793", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29793", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421302", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29793", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29793", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2543", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421302", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-29793", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to cause a denial of service", "sources": [ { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29793", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009628", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2543", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-57610", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421302", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29793", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "id": "VAR-202205-0250", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421302" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:24.584000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193765" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-29793 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29793" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29793/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-29793" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421302" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29793" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "date": "2022-05-13T15:15:09.937000", "db": "NVD", "id": "CVE-2022-29793" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-10T00:00:00", "db": "VULHUB", "id": "VHN-421302" }, { "date": "2023-02-10T00:00:00", "db": "VULMON", "id": "CVE-2022-29793" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "date": "2023-02-10T16:46:32.607000", "db": "NVD", "id": "CVE-2022-29793" }, { "date": "2022-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2543" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2543" } ], "trust": 0.6 } }
var-202210-0290
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0290", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41592" } ] }, "cve": "CVE-2022-41592", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41592", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41592", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-158", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "VULHUB", "id": "VHN-437829" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41592", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018794", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-158", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437829", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "id": "VAR-202210-0290", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437829" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:15.811000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210792" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41592" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41592/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437829" }, { "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "db": "NVD", "id": "CVE-2022-41592" }, { "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437829" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "date": "2022-10-14T16:15:26.127000", "db": "NVD", "id": "CVE-2022-41592" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437829" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018794" }, { "date": "2022-10-15T01:52:20.023000", "db": "NVD", "id": "CVE-2022-41592" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-158" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-158" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018794" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-158" } ], "trust": 0.6 } }
var-202204-0754
Vulnerability from variot
The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. An attacker could exploit this vulnerability to cause unauthorized access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0754", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22256" } ] }, "cve": "CVE-2022-22256", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-22256", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409785", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22256", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22256", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2017", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409785", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22256", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. An attacker could exploit this vulnerability to cause unauthorized access", "sources": [ { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22256", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-008143", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2017", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44625", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409785", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22256", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "id": "VAR-202204-0754", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409785" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:14.353000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=190069" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22256" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22256/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409785" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22256" }, { "date": "2023-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "date": "2022-04-11T20:15:19.657000", "db": "NVD", "id": "CVE-2022-22256" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-19T00:00:00", "db": "VULHUB", "id": "VHN-409785" }, { "date": "2022-04-19T00:00:00", "db": "VULMON", "id": "CVE-2022-22256" }, { "date": "2023-07-24T08:23:00", "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "date": "2022-04-19T14:49:07.153000", "db": "NVD", "id": "CVE-2022-22256" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ], "trust": 0.6 } }
var-202110-1495
Vulnerability from variot
There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1495", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22486" } ] }, "cve": "CVE-2021-22486", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22486", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380921", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22486", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22486", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2076", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380921", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380921" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "VULHUB", "id": "VHN-380921" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22486", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014314", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2076", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380921", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380921" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "id": "VAR-202110-1495", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380921" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:26.841000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22486", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171578" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22486" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380921" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380921" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380921" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "date": "2021-10-28T13:15:10.147000", "db": "NVD", "id": "CVE-2021-22486" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380921" }, { "date": "2022-10-12T08:41:00", "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "date": "2021-11-01T23:53:29.690000", "db": "NVD", "id": "CVE-2021-22486" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2076" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014314" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2076" } ], "trust": 0.6 } }
var-202208-0817
Vulnerability from variot
Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability. Huawei of EMUI and HarmonyOS There is a vulnerability in improper default permissions.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0817", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37006" } ] }, "cve": "CVE-2022-37006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37006", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2745", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability. Huawei of EMUI and HarmonyOS There is a vulnerability in improper default permissions.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android", "sources": [ { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37006", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014550", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2745", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427596", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37006", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "id": "VAR-202208-0817", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427596" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:19.486000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204382" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37006" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37006/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427596" }, { "db": "VULMON", "id": "CVE-2022-37006" }, { "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "db": "NVD", "id": "CVE-2022-37006" }, { "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427596" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37006" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "date": "2022-08-10T20:16:04.613000", "db": "NVD", "id": "CVE-2022-37006" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-427596" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37006" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014550" }, { "date": "2022-10-27T18:38:56.727000", "db": "NVD", "id": "CVE-2022-37006" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2745" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2745" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014550" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2745" } ], "trust": 0.6 } }
var-202111-1764
Vulnerability from variot
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1764", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39967" } ] }, "cve": "CVE-2021-39967", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39967", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401368", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39967", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39967", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2136", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401368", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39967", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017614", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2136", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14782", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401368", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39967", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "id": "VAR-202111-1764", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401368" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.522000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176797" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39967" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401368" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39967" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "date": "2022-01-03T22:15:10", "db": "NVD", "id": "CVE-2021-39967" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401368" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39967" }, { "date": "2023-01-27T07:25:00", "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "date": "2022-01-13T16:23:38.167000", "db": "NVD", "id": "CVE-2021-39967" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2136" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Improper Default Permission Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2136" } ], "trust": 0.6 } }
var-202112-0136
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0136", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37042" } ] }, "cve": "CVE-2021-37042", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37042", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398875", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37042", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37042", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202112-465", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398875", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "VULHUB", "id": "VHN-398875" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37042", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015794", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-465", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398875", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "id": "VAR-202112-0136", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398875" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.390000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173137" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.6, "url": "https://consumer.huawei.com/om/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37042" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398875" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "date": "2021-12-07T16:15:07.457000", "db": "NVD", "id": "CVE-2021-37042" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398875" }, { "date": "2022-11-30T05:01:00", "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37042" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-465" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015794" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-465" } ], "trust": 0.6 } }
var-202210-0344
Vulnerability from variot
The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41577" } ] }, "cve": "CVE-2022-41577", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41577", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41577", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-176", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "VULHUB", "id": "VHN-437803" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41577", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018795", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-176", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437803", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "id": "VAR-202210-0344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437803" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:53.208000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210794" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41577" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41577/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437803" }, { "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "db": "NVD", "id": "CVE-2022-41577" }, { "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437803" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "date": "2022-10-14T16:15:20.537000", "db": "NVD", "id": "CVE-2022-41577" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437803" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018795" }, { "date": "2022-10-15T01:51:25.887000", "db": "NVD", "id": "CVE-2022-41577" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-176" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-176" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018795" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-176" } ], "trust": 0.6 } }
var-202106-1924
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause exceptions in image processing. Huawei A buffer error vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1924", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22335" } ] }, "cve": "CVE-2021-22335", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22335", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380770", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22335", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22335", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-258", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380770", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause exceptions in image processing. Huawei A buffer error vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "VULHUB", "id": "VHN-380770" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22335", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007572", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-258", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380770", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "id": "VAR-202106-1924", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380770" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:59.864000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153903" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22335" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380770" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "date": "2021-06-03T20:15:08.500000", "db": "NVD", "id": "CVE-2021-22335" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380770" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22335" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-258" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Buffer error vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007572" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-258" } ], "trust": 0.6 } }
var-202212-0385
Vulnerability from variot
The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0385", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46321" } ] }, "cve": "CVE-2022-46321", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46321", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46321", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2481", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "VULHUB", "id": "VHN-444291" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46321", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024015", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2481", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444291", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444291" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "id": "VAR-202212-0385", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444291" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:10.860000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218944" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46321" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46321/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444291" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444291" }, { "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "db": "NVD", "id": "CVE-2022-46321" }, { "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444291" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "date": "2022-12-20T21:15:11.690000", "db": "NVD", "id": "CVE-2022-46321" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444291" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024015" }, { "date": "2022-12-24T04:16:32.950000", "db": "NVD", "id": "CVE-2022-46321" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2481" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2481" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024015" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2481" } ], "trust": 0.6 } }
var-202302-0368
Vulnerability from variot
The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48288" } ] }, "cve": "CVE-2022-48288", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48288", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48288", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-349", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48288", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003375", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-349", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453368", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48288", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "id": "VAR-202302-0368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453368" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:18.791000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225750" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48288 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48288" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48288/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48288" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453368" }, { "db": "VULMON", "id": "CVE-2022-48288" }, { "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "db": "NVD", "id": "CVE-2022-48288" }, { "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453368" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48288" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "date": "2023-02-09T17:15:12.650000", "db": "NVD", "id": "CVE-2022-48288" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453368" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48288" }, { "date": "2023-09-07T01:46:00", "db": "JVNDB", "id": "JVNDB-2023-003375" }, { "date": "2023-02-16T14:17:00.243000", "db": "NVD", "id": "CVE-2022-48288" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-349" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-349" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003375" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-349" } ], "trust": 0.6 } }
var-202210-0347
Vulnerability from variot
The BT Hfp Client module has a Use-After-Free (UAF) vulnerability.Successful exploitation of this vulnerability may result in arbitrary code execution
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38983" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38983" } ] }, "cve": "CVE-2022-38983", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38983", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-171", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The BT Hfp Client module has a Use-After-Free (UAF) vulnerability.Successful exploitation of this vulnerability may result in arbitrary code execution", "sources": [ { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "VULHUB", "id": "VHN-434762" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38983", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-171", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "id": "VAR-202210-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434762" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:51.263000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211153" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "NVD", "id": "CVE-2022-38983" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38983/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434762" }, { "db": "NVD", "id": "CVE-2022-38983" }, { "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434762" }, { "date": "2022-10-14T16:15:14.843000", "db": "NVD", "id": "CVE-2022-38983" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434762" }, { "date": "2022-10-18T13:21:24.750000", "db": "NVD", "id": "CVE-2022-38983" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-171" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-171" } ], "trust": 0.6 } }
var-202108-2210
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2210", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22445" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22445" } ] }, "cve": "CVE-2021-22445", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380880", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22445", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22445", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-130", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380880", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22445", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" }, { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone", "sources": [ { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22445", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-130", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380880", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22445", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" }, { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "id": "VAR-202108-2210", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380880" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:13.672000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159192" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "NVD", "id": "CVE-2021-22445" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22445" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" }, { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" }, { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380880" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22445" }, { "date": "2021-08-02T18:15:08.543000", "db": "NVD", "id": "CVE-2021-22445" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380880" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22445" }, { "date": "2021-12-09T17:57:49.973000", "db": "NVD", "id": "CVE-2021-22445" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-130" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-130" } ], "trust": 0.6 } }
var-202110-1483
Vulnerability from variot
There is a Memory leaks vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei There is a vulnerability in smartphones related to lack of free memory after expiration.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1483", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36993" } ] }, "cve": "CVE-2021-36993", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36993", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398826", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36993", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36993", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2091", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398826", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory leaks vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei There is a vulnerability in smartphones related to lack of free memory after expiration.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "VULHUB", "id": "VHN-398826" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36993", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014265", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2091", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398826", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "id": "VAR-202110-1483", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398826" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:00.612000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36993", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168229" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36993" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398826" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "date": "2021-10-28T13:15:10.697000", "db": "NVD", "id": "CVE-2021-36993" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-398826" }, { "date": "2022-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-36993" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2091" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014265" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2091" } ], "trust": 0.6 } }
var-202302-0467
Vulnerability from variot
The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0467", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48298" } ] }, "cve": "CVE-2022-48298", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48298", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48298", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-350", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48298", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003383", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-350", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453378", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48298", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "id": "VAR-202302-0467", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453378" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:19.866000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225751" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-1284", "trust": 1.0 }, { "problemtype": "Improper validation of quantity specified in input (CWE-1284) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48298" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48298/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453378" }, { "db": "VULMON", "id": "CVE-2022-48298" }, { "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "db": "NVD", "id": "CVE-2022-48298" }, { "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453378" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48298" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "date": "2023-02-09T17:15:14.687000", "db": "NVD", "id": "CVE-2022-48298" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453378" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48298" }, { "date": "2023-09-07T01:58:00", "db": "JVNDB", "id": "JVNDB-2023-003383" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48298" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-350" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-350" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Validation of Quantities Specified in Inputs in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003383" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-350" } ], "trust": 0.6 } }
var-202110-1501
Vulnerability from variot
There is an Out-of-bounds memory access in Huawei Smartphone.Successful exploitation of this vulnerability may cause process exceptions. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1501", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22474" } ] }, "cve": "CVE-2021-22474", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22474", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380909", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22474", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22474", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2068", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380909", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds memory access in Huawei Smartphone.Successful exploitation of this vulnerability may cause process exceptions. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "VULHUB", "id": "VHN-380909" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22474", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014320", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2068", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380909", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "id": "VAR-202110-1501", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380909" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:11.810000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22474", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168395" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22474" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380909" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "date": "2021-10-28T13:15:09.833000", "db": "NVD", "id": "CVE-2021-22474" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380909" }, { "date": "2022-10-12T08:50:00", "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22474" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2068" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014320" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2068" } ], "trust": 0.6 } }
var-202111-1584
Vulnerability from variot
There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have an injection vulnerability.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have injection attack vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1584", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37033" } ] }, "cve": "CVE-2021-37033", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37033", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398866", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37033", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37033", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1902", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398866", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have an injection vulnerability.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have injection attack vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "VULHUB", "id": "VHN-398866" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37033", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015553", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1902", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102864", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398866", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "id": "VAR-202111-1584", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398866" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:54.247000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei Emui Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172197" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-74", "trust": 1.1 }, { "problemtype": "injection (CWE-74) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37033" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398866" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "date": "2021-11-23T16:15:09.833000", "db": "NVD", "id": "CVE-2021-37033" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398866" }, { "date": "2022-11-24T06:21:00", "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "date": "2021-12-09T17:57:49.643000", "db": "NVD", "id": "CVE-2021-37033" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1902" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Injection Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015553" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1902" } ], "trust": 0.6 } }
var-202201-1715
Vulnerability from variot
There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI contains a double free vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1715", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40038" } ] }, "cve": "CVE-2021-40038", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40038", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401439", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40038", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40038", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-307", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401439", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40038", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI contains a double free vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40038", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002910", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-307", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401439", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40038", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "id": "VAR-202201-1715", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401439" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:47.540000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177453" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40038" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401439" }, { "date": "2022-01-10T00:00:00", "db": "VULMON", "id": "CVE-2021-40038" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "date": "2022-01-10T14:10:22.707000", "db": "NVD", "id": "CVE-2021-40038" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401439" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-40038" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "date": "2022-01-13T15:38:03.063000", "db": "NVD", "id": "CVE-2021-40038" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-307" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product double free vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-307" } ], "trust": 0.6 } }
var-202110-1363
Vulnerability from variot
There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1363", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22401" } ] }, "cve": "CVE-2021-22401", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22401", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380836", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22401", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22401", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2032", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380836", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380836" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "VULHUB", "id": "VHN-380836" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22401", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014174", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2032", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380836" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "id": "VAR-202110-1363", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380836" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:42.014000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=167714" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22401" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380836" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380836" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380836" }, { "date": "2022-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "date": "2021-10-28T13:15:08.427000", "db": "NVD", "id": "CVE-2021-22401" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380836" }, { "date": "2022-10-06T08:32:00", "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "date": "2021-10-28T20:32:16.273000", "db": "NVD", "id": "CVE-2021-22401" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2032" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014174" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2032" } ], "trust": 0.6 } }
var-202206-0376
Vulnerability from variot
The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an improper permissions retention vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0376", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31755" } ] }, "cve": "CVE-2022-31755", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31755", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423588", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31755", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31755", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-475", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423588", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31755", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an improper permissions retention vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31755", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011281", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-475", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66179", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423588", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31755", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "id": "VAR-202206-0376", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423588" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:37.162000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195990" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31755 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31755" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31755/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/281.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31755" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423588" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31755" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "date": "2022-06-13T15:15:10.100000", "db": "NVD", "id": "CVE-2022-31755" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423588" }, { "date": "2022-10-05T00:00:00", "db": "VULMON", "id": "CVE-2022-31755" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "date": "2022-10-05T14:59:00.427000", "db": "NVD", "id": "CVE-2022-31755" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-475" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Improper Retention of Permissions Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011281" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-475" } ], "trust": 0.6 } }
var-202209-0123
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0123", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38987" } ] }, "cve": "CVE-2022-38987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38987", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38987", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-201", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "VULHUB", "id": "VHN-428495" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38987", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016792", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-201", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428495", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "id": "VAR-202209-0123", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428495" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:58.934000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208093" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38987" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38987/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428495" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "date": "2022-09-16T18:15:17.437000", "db": "NVD", "id": "CVE-2022-38987" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428495" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "date": "2022-09-17T03:46:36.700000", "db": "NVD", "id": "CVE-2022-38987" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ], "trust": 0.6 } }
var-202110-1478
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1478", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36998" } ] }, "cve": "CVE-2021-36998", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36998", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-397933", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-36998", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36998", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2098", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-397933", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-397933" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "VULHUB", "id": "VHN-397933" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36998", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014260", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2098", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-397933", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-397933" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "id": "VAR-202110-1478", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-397933" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:55.915000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36998", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168235" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36998" } ], "sources": [ { "db": "VULHUB", "id": "VHN-397933" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-397933" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-397933" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "date": "2021-10-28T13:15:10.913000", "db": "NVD", "id": "CVE-2021-36998" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-397933" }, { "date": "2022-10-11T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "date": "2021-11-01T20:50:04.947000", "db": "NVD", "id": "CVE-2021-36998" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2098" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014260" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2098" } ], "trust": 0.6 } }
var-202110-1849
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1849", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37114" } ] }, "cve": "CVE-2021-37114", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37114", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398950", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37114", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37114", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2232", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398950", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37114", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017375", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2232", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398950", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37114", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "id": "VAR-202110-1849", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398950" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:24.962000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176780" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37114" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398950" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37114" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "date": "2022-01-03T22:15:09.227000", "db": "NVD", "id": "CVE-2021-37114" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398950" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37114" }, { "date": "2023-01-17T06:34:00", "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "date": "2022-01-11T19:39:59.973000", "db": "NVD", "id": "CVE-2021-37114" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2232" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2232" } ], "trust": 0.6 } }
var-202209-0321
Vulnerability from variot
The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. Huawei of EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0321", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39006" } ] }, "cve": "CVE-2022-39006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39006", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202209-202", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. Huawei of EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39006", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017588", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-202", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64986", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428494", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39006", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "id": "VAR-202209-0321", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428494" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:14.188000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208617" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39006" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39006/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428494" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39006" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "date": "2022-09-16T18:15:18.133000", "db": "NVD", "id": "CVE-2022-39006" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428494" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39006" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "date": "2022-09-21T12:55:11.720000", "db": "NVD", "id": "CVE-2022-39006" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product race condition vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ], "trust": 0.6 } }
var-202112-0138
Vulnerability from variot
There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0138", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37038" } ] }, "cve": "CVE-2021-37038", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37038", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398871", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37038", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37038", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-460", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398871", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "VULHUB", "id": "VHN-398871" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37038", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015796", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-460", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102853", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398871", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "id": "VAR-202112-0138", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398871" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.397000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173132" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37038" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398871" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "date": "2021-12-07T16:15:07.377000", "db": "NVD", "id": "CVE-2021-37038" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398871" }, { "date": "2022-11-30T05:12:00", "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37038" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-460" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015796" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-460" } ], "trust": 0.6 } }
var-202212-0449
Vulnerability from variot
The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46856" } ] }, "cve": "CVE-2021-46856", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46856", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46856", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2490", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "VULHUB", "id": "VHN-430164" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46856", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-003430", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2490", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430164", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "id": "VAR-202212-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430164" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:32.236000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02023", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=219372" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46856" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46856/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430164" }, { "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "db": "NVD", "id": "CVE-2021-46856" }, { "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-430164" }, { "date": "2023-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "date": "2022-12-20T21:15:10.427000", "db": "NVD", "id": "CVE-2021-46856" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-09T00:00:00", "db": "VULHUB", "id": "VHN-430164" }, { "date": "2023-02-17T01:53:00", "db": "JVNDB", "id": "JVNDB-2022-003430" }, { "date": "2023-11-07T03:40:05.423000", "db": "NVD", "id": "CVE-2021-46856" }, { "date": "2023-01-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2490" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2490" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003430" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2490" } ], "trust": 0.6 } }
var-202106-0613
Vulnerability from variot
There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may induce users to grant permissions on modifying items in the configuration table,causing system exceptions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0613", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22351" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22351" } ] }, "cve": "CVE-2021-22351", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-380786", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2021-22351", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22351", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2011", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380786", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22351", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may induce users to grant permissions on modifying items in the configuration table,causing system exceptions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22351", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2011", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380786", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22351", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "id": "VAR-202106-0613", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380786" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:36.778000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for vulnerabilities in trust management issues on Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156089" }, { "title": "CVE-2021-22351", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22351 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22351" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22351" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/522.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22351" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380786" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22351" }, { "date": "2021-06-30T21:15:09.867000", "db": "NVD", "id": "CVE-2021-22351" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380786" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22351" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22351" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2011" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone trust management issue vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2011" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2011" } ], "trust": 0.6 } }
var-202209-0449
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38989" } ] }, "cve": "CVE-2022-38989", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38989", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38989", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-196", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "VULHUB", "id": "VHN-428498" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38989", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016790", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-196", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428498", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "id": "VAR-202209-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428498" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:32.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208091" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38989" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38989/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428498" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "date": "2022-09-16T18:15:17.513000", "db": "NVD", "id": "CVE-2022-38989" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428498" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "date": "2022-09-17T03:45:39.930000", "db": "NVD", "id": "CVE-2022-38989" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ], "trust": 0.6 } }
var-202212-0421
Vulnerability from variot
Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0421", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" } ] }, "cve": "CVE-2022-46327", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46327", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2511", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions", "sources": [ { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "VULHUB", "id": "VHN-444297" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46327", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202212-2511", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444297", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444297" }, { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "id": "VAR-202212-0421", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444297" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:10.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218958" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46327" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46327/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444297" }, { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444297" }, { "db": "NVD", "id": "CVE-2022-46327" }, { "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444297" }, { "date": "2022-12-20T21:15:11.987000", "db": "NVD", "id": "CVE-2022-46327" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444297" }, { "date": "2022-12-24T04:16:53.907000", "db": "NVD", "id": "CVE-2022-46327" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2511" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2511" } ], "trust": 0.6 } }
var-202101-1003
Vulnerability from variot
There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure. plural Huawei Smartphones are vulnerable to lack of authentication for critical features.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. Huawei smartphones have security vulnerabilities that attackers can exploit to obtain low-sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1003", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9143" } ] }, "cve": "CVE-2020-9143", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9143", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187268", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2020-9143", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9143", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202101-1097", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187268", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure. plural Huawei Smartphones are vulnerable to lack of authentication for critical features.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. Huawei smartphones have security vulnerabilities that attackers can exploit to obtain low-sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "VULHUB", "id": "VHN-187268" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9143", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015409", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1097", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-187268", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "id": "VAR-202101-1003", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187268" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:39.304000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139457" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for important features (CWE-306) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9143" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187268" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "date": "2021-01-13T22:15:14.177000", "db": "NVD", "id": "CVE-2020-9143" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "VULHUB", "id": "VHN-187268" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-9143" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1097" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding lack of authentication for important functions in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015409" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1097" } ], "trust": 0.6 } }
var-202110-1497
Vulnerability from variot
There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1497", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22483" } ] }, "cve": "CVE-2021-22483", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22483", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380918", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22483", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22483", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2074", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380918", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380918" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "VULHUB", "id": "VHN-380918" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22483", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014316", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2074", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380918", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380918" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "id": "VAR-202110-1497", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380918" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:16.936000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22483", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168214" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22483" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380918" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380918" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380918" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "date": "2021-10-28T13:15:10.050000", "db": "NVD", "id": "CVE-2021-22483" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380918" }, { "date": "2022-10-12T08:44:00", "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "date": "2021-11-01T23:55:13.207000", "db": "NVD", "id": "CVE-2021-22483" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2074" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014316" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2074" } ], "trust": 0.6 } }
var-202110-1418
Vulnerability from variot
There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1418", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22403" } ] }, "cve": "CVE-2021-22403", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22403", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380838", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22403", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22403", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2034", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380838", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380838" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "VULHUB", "id": "VHN-380838" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22403", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014459", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2034", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380838", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380838" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "id": "VAR-202110-1418", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380838" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:00.676000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168385" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22403" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380838" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380838" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380838" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "date": "2021-10-28T13:15:08.530000", "db": "NVD", "id": "CVE-2021-22403" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380838" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "date": "2021-11-02T14:41:12.773000", "db": "NVD", "id": "CVE-2021-22403" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2034" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014459" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2034" } ], "trust": 0.6 } }
var-202106-0592
Vulnerability from variot
There is a Permission Control Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect normal use of the device. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There are security vulnerabilities in several Huawei SmartPhone, which stems from the lack of effective permissions and access control measures in the products. The following products and versions are affected: EMUI 10.1.1, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0592", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22368" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22368" } ] }, "cve": "CVE-2021-22368", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380803", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22368", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22368", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2003", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380803", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22368", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission Control Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect normal use of the device. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There are security vulnerabilities in several Huawei SmartPhone, which stems from the lack of effective permissions and access control measures in the products. The following products and versions are affected: EMUI 10.1.1, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22368", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2003", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380803", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22368", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "id": "VAR-202106-0592", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380803" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:36.804000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156082" }, { "title": "CVE-2021-22368", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22368 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "NVD", "id": "CVE-2021-22368" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22368" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22368" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380803" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22368" }, { "date": "2021-06-30T18:15:08.540000", "db": "NVD", "id": "CVE-2021-22368" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380803" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22368" }, { "date": "2021-07-06T18:02:52.083000", "db": "NVD", "id": "CVE-2021-22368" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2003" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2003" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2003" } ], "trust": 0.6 } }
var-202206-0263
Vulnerability from variot
The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0263", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46812" } ] }, "cve": "CVE-2021-46812", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46812", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423545", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46812", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46812", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-471", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423545", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46812", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46812", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011373", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-471", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66175", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423545", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46812", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "id": "VAR-202206-0263", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423545" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:40.636000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46812" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46812/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423545" }, { "db": "VULMON", "id": "CVE-2021-46812" }, { "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "db": "NVD", "id": "CVE-2021-46812" }, { "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423545" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46812" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "date": "2022-06-13T16:15:08.137000", "db": "NVD", "id": "CVE-2021-46812" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423545" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46812" }, { "date": "2023-08-21T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-011373" }, { "date": "2022-06-18T03:12:06.017000", "db": "NVD", "id": "CVE-2021-46812" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-471" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-471" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011373" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-471" } ], "trust": 0.6 } }
var-202209-0322
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0322", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38979" } ] }, "cve": "CVE-2022-38979", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38979", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38979", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-184", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "VULHUB", "id": "VHN-428508" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38979", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016793", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-184", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428508", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "id": "VAR-202209-0322", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428508" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:27.861000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208086" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38979" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38979/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428508" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "date": "2022-09-16T18:15:17.387000", "db": "NVD", "id": "CVE-2022-38979" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428508" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "date": "2022-09-17T03:18:37.613000", "db": "NVD", "id": "CVE-2022-38979" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ], "trust": 0.6 } }
var-202209-0431
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0431", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38995" } ] }, "cve": "CVE-2022-38995", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38995", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38995", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-175", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "VULHUB", "id": "VHN-434767" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38995", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016784", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-175", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434767", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434767" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "id": "VAR-202209-0431", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434767" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:12.504000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208082" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38995" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38995/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434767" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434767" }, { "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "db": "NVD", "id": "CVE-2022-38995" }, { "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434767" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "date": "2022-09-16T18:15:17.743000", "db": "NVD", "id": "CVE-2022-38995" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-434767" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016784" }, { "date": "2022-09-17T03:12:10.783000", "db": "NVD", "id": "CVE-2022-38995" }, { "date": "2022-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016784" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-175" } ], "trust": 0.6 } }
var-202211-0461
Vulnerability from variot
Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0461", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44556" } ] }, "cve": "CVE-2022-44556", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44556", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44556", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2335", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and HarmonyOS There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "VULHUB", "id": "VHN-441944" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44556", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020502", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2335", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441944", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "id": "VAR-202211-0461", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441944" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:48.096000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213747" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44556" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44556/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441944" }, { "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "db": "NVD", "id": "CVE-2022-44556" }, { "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-08T00:00:00", "db": "VULHUB", "id": "VHN-441944" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "date": "2022-11-08T18:15:11.483000", "db": "NVD", "id": "CVE-2022-44556" }, { "date": "2022-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-03T00:00:00", "db": "VULHUB", "id": "VHN-441944" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020502" }, { "date": "2023-11-07T03:54:19.583000", "db": "NVD", "id": "CVE-2022-44556" }, { "date": "2022-12-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2335" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2335" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020502" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2335" } ], "trust": 0.6 } }
var-202207-0134
Vulnerability from variot
The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0. The vulnerability is due to the improper neutralization of the special elements used in the command. abnormal function
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0134", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34740" } ] }, "cve": "CVE-2022-34740", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34740", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-427089", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34740", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34740", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-397", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-427089", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-34740", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0. The vulnerability is due to the improper neutralization of the special elements used in the command. abnormal function", "sources": [ { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34740", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013200", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-397", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-57612", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427089", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34740", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "id": "VAR-202207-0134", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427089" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:22.245000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199746" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34740" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34740/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427089" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34740" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "date": "2022-07-12T14:15:19.453000", "db": "NVD", "id": "CVE-2022-34740" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427089" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34740" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "date": "2022-07-19T14:08:05.747000", "db": "NVD", "id": "CVE-2022-34740" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013200" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ], "trust": 0.6 } }
var-202210-0287
Vulnerability from variot
The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" } ] }, "cve": "CVE-2022-41581", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41581", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-167", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access", "sources": [ { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "VULHUB", "id": "VHN-437811" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41581", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-167", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437811", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437811" }, { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "id": "VAR-202210-0287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437811" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:25.622000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211149" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41581" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41581/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437811" }, { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437811" }, { "db": "NVD", "id": "CVE-2022-41581" }, { "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437811" }, { "date": "2022-10-14T16:15:22.013000", "db": "NVD", "id": "CVE-2022-41581" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437811" }, { "date": "2022-10-18T17:33:57.627000", "db": "NVD", "id": "CVE-2022-41581" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-167" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-167" } ], "trust": 0.6 } }
var-202212-0650
Vulnerability from variot
The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0650", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46320" } ] }, "cve": "CVE-2022-46320", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46320", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46320", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2506", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "VULHUB", "id": "VHN-444290" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46320", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024016", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2506", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444290", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "id": "VAR-202212-0650", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444290" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:49.408000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218956" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46320" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46320/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444290" }, { "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "db": "NVD", "id": "CVE-2022-46320" }, { "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444290" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "date": "2022-12-20T21:15:11.647000", "db": "NVD", "id": "CVE-2022-46320" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444290" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024016" }, { "date": "2022-12-24T04:16:20.820000", "db": "NVD", "id": "CVE-2022-46320" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2506" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2506" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024016" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2506" } ], "trust": 0.6 } }
var-202110-1485
Vulnerability from variot
There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1485", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36991" } ] }, "cve": "CVE-2021-36991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36991", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398824", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36991", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36991", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2089", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398824", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "VULHUB", "id": "VHN-398824" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36991", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014267", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2089", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398824", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "id": "VAR-202110-1485", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398824" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:22.950000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36991", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168227" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36991" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398824" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "date": "2021-10-28T13:15:10.613000", "db": "NVD", "id": "CVE-2021-36991" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398824" }, { "date": "2022-10-11T09:02:00", "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-36991" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2089" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014267" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2089" } ], "trust": 0.6 } }
var-202112-0944
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0944", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39996" } ] }, "cve": "CVE-2021-39996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39996", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-05170", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401397", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39996", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39996", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2022-05170", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-214", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401397", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39996", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017522", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05170", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-214", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401397", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "id": "VAR-202112-0944", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" } ] }, "last_update_date": "2023-12-18T12:26:32.581000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Heap Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315096" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172738" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39996" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05170" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401397" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "date": "2022-01-10T14:10:20.823000", "db": "NVD", "id": "CVE-2021-39996" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05170" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401397" }, { "date": "2023-01-24T06:07:00", "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "date": "2022-01-13T02:13:52.250000", "db": "NVD", "id": "CVE-2021-39996" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-214" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017522" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-214" } ], "trust": 0.6 } }
var-202205-0115
Vulnerability from variot
The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS security component
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0115", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29792" } ] }, "cve": "CVE-2022-29792", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-29792", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-421301", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29792", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29792", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2550", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421301", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS security component", "sources": [ { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29792", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009629", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2550", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-50634", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421301", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29792", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "id": "VAR-202205-0115", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421301" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:54.737000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193771" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29792" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29792/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421301" }, { "db": "VULMON", "id": "CVE-2022-29792" }, { "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "db": "NVD", "id": "CVE-2022-29792" }, { "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29792" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "date": "2022-05-13T15:15:09.887000", "db": "NVD", "id": "CVE-2022-29792" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29792" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009629" }, { "date": "2022-05-23T18:41:49.983000", "db": "NVD", "id": "CVE-2022-29792" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2550" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2550" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009629" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2550" } ], "trust": 0.6 } }
var-202209-0256
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0256", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38996" } ] }, "cve": "CVE-2022-38996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38996", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38996", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-179", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "VULHUB", "id": "VHN-428513" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38996", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016783", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-179", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428513", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428513" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "id": "VAR-202209-0256", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428513" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:53.663000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208084" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38996" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38996/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428513" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428513" }, { "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "db": "NVD", "id": "CVE-2022-38996" }, { "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428513" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "date": "2022-09-16T18:15:17.780000", "db": "NVD", "id": "CVE-2022-38996" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428513" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016783" }, { "date": "2022-09-17T03:46:47.113000", "db": "NVD", "id": "CVE-2022-38996" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-179" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016783" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-179" } ], "trust": 0.6 } }
var-202207-0112
Vulnerability from variot
The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by abnormal function when the card is activated
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0112", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34741" } ] }, "cve": "CVE-2022-34741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34741", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-427090", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34741", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34741", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-396", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-427090", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-34741", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by abnormal function when the card is activated", "sources": [ { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34741", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013199", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-396", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52819", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427090", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34741", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "id": "VAR-202207-0112", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427090" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:34.914000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199745" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34741" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34741/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427090" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34741" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "date": "2022-07-12T14:15:19.493000", "db": "NVD", "id": "CVE-2022-34741" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427090" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34741" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "date": "2022-07-19T14:10:47.477000", "db": "NVD", "id": "CVE-2022-34741" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013199" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ], "trust": 0.6 } }
var-202302-0392
Vulnerability from variot
The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications). EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0392", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48295" } ] }, "cve": "CVE-2022-48295", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48295", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48295", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-352", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications). EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48295", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003621", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-352", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453375", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48295", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "id": "VAR-202302-0392", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453375" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:14.719000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225929" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48295" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48295/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453375" }, { "db": "VULMON", "id": "CVE-2022-48295" }, { "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "db": "NVD", "id": "CVE-2022-48295" }, { "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453375" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48295" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "date": "2023-02-09T17:15:14.113000", "db": "NVD", "id": "CVE-2022-48295" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453375" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48295" }, { "date": "2023-09-14T07:48:00", "db": "JVNDB", "id": "JVNDB-2023-003621" }, { "date": "2023-02-17T13:43:06.680000", "db": "NVD", "id": "CVE-2022-48295" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-352" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-352" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Permission Preservation Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003621" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-352" } ], "trust": 0.6 } }
var-202201-1018
Vulnerability from variot
There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity. Huawei EMUI , HarmonyOS , Magic UI Exists in a resource exhaustion vulnerability.Information may be tampered with. The Huawei Smartphone is a smartphone from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1018", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40011" } ] }, "cve": "CVE-2021-40011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40011", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-03943", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401412", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40011", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40011", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-03943", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-566", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401412", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity. Huawei EMUI , HarmonyOS , Magic UI Exists in a resource exhaustion vulnerability.Information may be tampered with. The Huawei Smartphone is a smartphone from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40011", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002890", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-03943", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-566", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401412", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "id": "VAR-202201-1018", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" } ] }, "last_update_date": "2023-12-18T13:32:22.572000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02022", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "title": "Patch for HuaWei smartphone denial of service vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/313801" }, { "title": "Huawei Smartphone Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178042" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40011" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-03943" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401412" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "date": "2022-01-10T14:10:21.407000", "db": "NVD", "id": "CVE-2021-40011" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-03943" }, { "date": "2022-04-25T00:00:00", "db": "VULHUB", "id": "VHN-401412" }, { "date": "2023-01-24T03:30:00", "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "date": "2022-04-25T17:57:56.870000", "db": "NVD", "id": "CVE-2021-40011" }, { "date": "2022-04-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-566" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product resource exhaustion vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-566" } ], "trust": 0.6 } }
var-202110-1503
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1503", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22472" } ] }, "cve": "CVE-2021-22472", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22472", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380907", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22472", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22472", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2066", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380907", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22472", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22472", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014322", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2066", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380907", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22472", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "id": "VAR-202110-1503", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380907" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:18.798000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22472", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171553" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22472" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380907" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22472" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "date": "2021-10-28T13:15:09.747000", "db": "NVD", "id": "CVE-2021-22472" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380907" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22472" }, { "date": "2022-10-12T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "date": "2021-11-02T00:14:49.863000", "db": "NVD", "id": "CVE-2021-22472" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2066" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014322" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2066" } ], "trust": 0.6 } }
var-202202-0423
Vulnerability from variot
There is an improper memory access permission configuration on ACPU.Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0423", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "db": "NVD", "id": "CVE-2021-37107" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37107" } ] }, "cve": "CVE-2021-37107", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37107", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-398942", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37107", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37107", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-853", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398942", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398942" }, { "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "db": "NVD", "id": "CVE-2021-37107" }, { "db": "CNNVD", "id": "CNNVD-202202-853" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper memory access permission configuration on ACPU.Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI Exists in an out-of-bounds write vulnerability.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-37107" }, { "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "db": "VULHUB", "id": "VHN-398942" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37107", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005083", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-853", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-12766", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398942", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398942" }, { "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "db": "NVD", "id": "CVE-2021-37107" }, { "db": "CNNVD", "id": "CNNVD-202202-853" } ] }, "id": "VAR-202202-0423", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398942" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:51.733000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184115" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "db": "CNNVD", "id": "CNNVD-202202-853" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398942" }, { "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "db": "NVD", "id": "CVE-2021-37107" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37107" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398942" }, { "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "db": "NVD", "id": "CVE-2021-37107" }, { "db": "CNNVD", "id": "CNNVD-202202-853" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398942" }, { "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "db": "NVD", "id": "CVE-2021-37107" }, { "db": "CNNVD", "id": "CNNVD-202202-853" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-398942" }, { "date": "2023-05-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "date": "2022-02-09T23:15:15.897000", "db": "NVD", "id": "CVE-2021-37107" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-853" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-398942" }, { "date": "2023-05-17T08:35:00", "db": "JVNDB", "id": "JVNDB-2022-005083" }, { "date": "2022-02-25T16:09:15.637000", "db": "NVD", "id": "CVE-2021-37107" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-853" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-853" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005083" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-853" } ], "trust": 0.6 } }
var-202111-1586
Vulnerability from variot
There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Authentication vulnerabilities exist in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1586", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37029" } ] }, "cve": "CVE-2021-37029", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37029", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398861", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37029", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37029", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-1893", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398861", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398861" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Authentication vulnerabilities exist in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "VULHUB", "id": "VHN-398861" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37029", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015559", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1893", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102865", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398861", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398861" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "id": "VAR-202111-1586", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398861" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:09.608000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172191" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37029" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398861" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398861" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398861" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "date": "2021-11-23T16:15:09.667000", "db": "NVD", "id": "CVE-2021-37029" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398861" }, { "date": "2022-11-24T06:43:00", "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "date": "2021-12-09T17:57:49.587000", "db": "NVD", "id": "CVE-2021-37029" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1893" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015559" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1893" } ], "trust": 0.6 } }
var-202101-1001
Vulnerability from variot
There is a improper privilege management vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability can cause information disclosure and malfunctions due to insufficient verification of data authenticity. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1001", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9141" } ] }, "cve": "CVE-2020-9141", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9141", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187266", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9141", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9141", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1100", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187266", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a improper privilege management vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability can cause information disclosure and malfunctions due to insufficient verification of data authenticity. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "VULHUB", "id": "VHN-187266" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9141", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015407", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1100", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-187266", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "id": "VAR-202101-1001", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187266" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:46.423000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Repair measures for Huawei smartphone authorization bugs", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139460" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": " Inadequate verification of data reliability (CWE-345) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9141" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187266" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "date": "2021-01-13T22:15:14.083000", "db": "NVD", "id": "CVE-2020-9141" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "VULHUB", "id": "VHN-187266" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-9141" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1100" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Insufficient verification vulnerability in data reliability on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015407" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1100" } ], "trust": 0.6 } }
var-202108-2208
Vulnerability from variot
There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei EMUI/Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2208", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22447" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22447" } ] }, "cve": "CVE-2021-22447", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380882", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22447", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22447", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-133", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380882", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22447", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" }, { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei EMUI/Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22447", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-133", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380882", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22447", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" }, { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "id": "VAR-202108-2208", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380882" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:47:01.603000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159194" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-754", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "NVD", "id": "CVE-2021-22447" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22447" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/754.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" }, { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" }, { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380882" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22447" }, { "date": "2021-08-02T18:15:08.643000", "db": "NVD", "id": "CVE-2021-22447" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380882" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22447" }, { "date": "2021-12-09T17:57:50", "db": "NVD", "id": "CVE-2021-22447" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-133" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-133" } ], "trust": 0.6 } }
var-202107-1680
Vulnerability from variot
There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1680", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22430" } ] }, "cve": "CVE-2021-22430", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22430", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380865", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22430", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22430", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2225", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380865", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "VULHUB", "id": "VHN-380865" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22430", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018745", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2225", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380865", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "id": "VAR-202107-1680", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380865" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:09.853000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171998" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-94", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22430" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22430/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380865" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "date": "2022-02-25T19:15:09.610000", "db": "NVD", "id": "CVE-2021-22430" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380865" }, { "date": "2023-07-06T01:50:00", "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22430" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2225" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2225" } ], "trust": 0.6 } }
var-202211-0633
Vulnerability from variot
The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0633", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44546" } ] }, "cve": "CVE-2022-44546", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44546", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44546", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2139", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "VULHUB", "id": "VHN-441924" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44546", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020507", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2139", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441924", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441924" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "id": "VAR-202211-0633", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441924" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:54.780000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213976" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44546" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44546/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441924" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441924" }, { "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "db": "NVD", "id": "CVE-2022-44546" }, { "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441924" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "date": "2022-11-09T21:15:17.930000", "db": "NVD", "id": "CVE-2022-44546" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441924" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020507" }, { "date": "2022-11-10T13:52:04.360000", "db": "NVD", "id": "CVE-2022-44546" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2139" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2139" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020507" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2139" } ], "trust": 0.6 } }
var-202211-0452
Vulnerability from variot
The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0452", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46851" } ] }, "cve": "CVE-2021-46851", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46851", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46851", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2138", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "VULHUB", "id": "VHN-430159" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46851", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020635", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2138", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430159", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430159" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "id": "VAR-202211-0452", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430159" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:41.797000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213975" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46851" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46851/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430159" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430159" }, { "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "db": "NVD", "id": "CVE-2021-46851" }, { "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-430159" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "date": "2022-11-09T21:15:12.877000", "db": "NVD", "id": "CVE-2021-46851" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-430159" }, { "date": "2023-11-02T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-020635" }, { "date": "2022-11-10T19:26:24.317000", "db": "NVD", "id": "CVE-2021-46851" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2138" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2138" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020635" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2138" } ], "trust": 0.6 } }
var-202202-1525
Vulnerability from variot
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity. HUAWEI EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1525", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37027" } ] }, "cve": "CVE-2021-37027", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37027", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398860", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37027", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37027", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202202-2069", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398860", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398860" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity. HUAWEI EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "VULHUB", "id": "VHN-398860" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37027", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-007119", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-2069", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398860", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398860" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "id": "VAR-202202-1525", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398860" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:51.559000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185294" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37027" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-37027/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398860" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398860" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-398860" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "date": "2022-02-25T19:15:11.727000", "db": "NVD", "id": "CVE-2021-37027" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-398860" }, { "date": "2023-07-12T06:52:00", "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "date": "2022-03-08T13:55:49.213000", "db": "NVD", "id": "CVE-2021-37027" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2069" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI\u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007119" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2069" } ], "trust": 0.6 } }
var-202211-0369
Vulnerability from variot
The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0369", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" } ] }, "cve": "CVE-2022-44551", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44551", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2135", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability", "sources": [ { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "VULHUB", "id": "VHN-441934" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44551", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2135", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441934", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441934" }, { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "id": "VAR-202211-0369", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441934" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:26:59.534000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214357" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44551" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44551/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441934" }, { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441934" }, { "db": "NVD", "id": "CVE-2022-44551" }, { "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441934" }, { "date": "2022-11-09T21:15:18.293000", "db": "NVD", "id": "CVE-2022-44551" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441934" }, { "date": "2022-11-14T19:15:45.333000", "db": "NVD", "id": "CVE-2022-44551" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2135" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2135" } ], "trust": 0.6 } }
var-202101-1945
Vulnerability from variot
There is a heap overflow vulnerability in some Huawei smartphone, attackers can exploit this vulnerability to cause heap overflows due to improper restriction of operations within the bounds of a memory buffer. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1945", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9144" } ] }, "cve": "CVE-2020-9144", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9144", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187269", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9144", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9144", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1049", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187269", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap overflow vulnerability in some Huawei smartphone, attackers can exploit this vulnerability to cause heap overflows due to improper restriction of operations within the bounds of a memory buffer. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "VULHUB", "id": "VHN-187269" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9144", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015438", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1049", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52826", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-187269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "id": "VAR-202101-1945", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187269" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:17.613000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Huawei Emui and Honor Magic Ui Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139436" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9144" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187269" }, { "date": "2021-09-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "date": "2021-01-13T19:15:17.057000", "db": "NVD", "id": "CVE-2020-9144" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-187269" }, { "date": "2021-09-22T09:11:00", "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "date": "2021-12-09T17:57:49.813000", "db": "NVD", "id": "CVE-2020-9144" }, { "date": "2021-07-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1049" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding out-of-bounds writing on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015438" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1049" } ], "trust": 0.6 } }
var-202302-0316
Vulnerability from variot
The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0316", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48301" } ] }, "cve": "CVE-2022-48301", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48301", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48301", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-342", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48301", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003613", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-342", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453381", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48301", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "id": "VAR-202302-0316", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453381" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:31.223000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225928" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48301" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48301/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453381" }, { "db": "VULMON", "id": "CVE-2022-48301" }, { "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "db": "NVD", "id": "CVE-2022-48301" }, { "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453381" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48301" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "date": "2023-02-09T17:15:15.343000", "db": "NVD", "id": "CVE-2022-48301" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453381" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48301" }, { "date": "2023-09-14T07:25:00", "db": "JVNDB", "id": "JVNDB-2023-003613" }, { "date": "2023-02-17T13:04:34.307000", "db": "NVD", "id": "CVE-2022-48301" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-342" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-342" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Permission Preservation Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003613" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-342" } ], "trust": 0.6 } }
var-202108-2211
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2211", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22444" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22444" } ] }, "cve": "CVE-2021-22444", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380879", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22444", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22444", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-127", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380879", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22444", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" }, { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22444", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-127", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380879", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22444", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" }, { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "id": "VAR-202108-2211", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380879" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:06.555000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159081" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "NVD", "id": "CVE-2021-22444" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22444" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" }, { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" }, { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380879" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22444" }, { "date": "2021-08-02T17:15:14.660000", "db": "NVD", "id": "CVE-2021-22444" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380879" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22444" }, { "date": "2021-12-09T17:55:11.043000", "db": "NVD", "id": "CVE-2021-22444" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-127" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-127" } ], "trust": 0.6 } }
var-202108-2212
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random address access. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2212", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22443" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22443" } ] }, "cve": "CVE-2021-22443", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380878", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22443", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22443", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-125", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380878", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22443", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" }, { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random address access. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone", "sources": [ { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22443", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-125", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380878", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22443", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" }, { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "id": "VAR-202108-2212", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380878" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:44.456000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159079" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "NVD", "id": "CVE-2021-22443" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22443" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" }, { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" }, { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380878" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22443" }, { "date": "2021-08-02T17:15:14.613000", "db": "NVD", "id": "CVE-2021-22443" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380878" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22443" }, { "date": "2021-12-09T17:55:11.037000", "db": "NVD", "id": "CVE-2021-22443" }, { "date": "2022-03-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-125" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-125" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-125" } ], "trust": 0.6 } }
var-202108-2200
Vulnerability from variot
There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2200", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22428" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22428" } ] }, "cve": "CVE-2021-22428", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-380863", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-22428", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22428", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-120", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380863", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22428", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" }, { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22428", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-120", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380863", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22428", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" }, { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "id": "VAR-202108-2200", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380863" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:25.152000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159191" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "CWE-459", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "NVD", "id": "CVE-2021-22428" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22428" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/459.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" }, { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" }, { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380863" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22428" }, { "date": "2021-08-02T17:15:14.440000", "db": "NVD", "id": "CVE-2021-22428" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380863" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22428" }, { "date": "2021-12-09T17:55:10.190000", "db": "NVD", "id": "CVE-2021-22428" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-120" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-120" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-120" } ], "trust": 0.6 } }
var-202301-0724
Vulnerability from variot
The memory management module has a logic bypass vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0724", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46762" } ] }, "cve": "CVE-2022-46762", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46762", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46762", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-437", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The memory management module has a logic bypass vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46762", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001769", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-437", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-447442", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-46762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "id": "VAR-202301-0724", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-447442" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:43.691000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221314" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46762" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46762/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-447442" }, { "db": "VULMON", "id": "CVE-2022-46762" }, { "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "db": "NVD", "id": "CVE-2022-46762" }, { "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-447442" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-46762" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "date": "2023-01-06T20:15:09.773000", "db": "NVD", "id": "CVE-2022-46762" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-447442" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-46762" }, { "date": "2023-05-09T01:48:00", "db": "JVNDB", "id": "JVNDB-2023-001769" }, { "date": "2023-01-12T17:15:36.043000", "db": "NVD", "id": "CVE-2022-46762" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-437" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-437" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001769" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-437" } ], "trust": 0.6 } }
var-202211-0384
Vulnerability from variot
The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0384", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" } ] }, "cve": "CVE-2022-44552", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44552", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2122", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability", "sources": [ { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "VULHUB", "id": "VHN-441936" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44552", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2122", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441936", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441936" }, { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "id": "VAR-202211-0384", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441936" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:46.291000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214352" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44552" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44552/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441936" }, { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441936" }, { "db": "NVD", "id": "CVE-2022-44552" }, { "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441936" }, { "date": "2022-11-09T21:15:18.387000", "db": "NVD", "id": "CVE-2022-44552" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441936" }, { "date": "2022-11-14T19:15:20.207000", "db": "NVD", "id": "CVE-2022-44552" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2122" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2122" } ], "trust": 0.6 } }
var-202203-0264
Vulnerability from variot
There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0264", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40056" } ] }, "cve": "CVE-2021-40056", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40056", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401457", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40056", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40056", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-980", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401457", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "VULHUB", "id": "VHN-401457" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40056", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018708", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-980", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401457", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "id": "VAR-202203-0264", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401457" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:33.619000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186009" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40056" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40056/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401457" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "date": "2022-03-10T17:43:21.363000", "db": "NVD", "id": "CVE-2021-40056" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401457" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "date": "2022-03-14T15:54:15.660000", "db": "NVD", "id": "CVE-2021-40056" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-980" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018708" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-980" } ], "trust": 0.6 } }
var-202107-0367
Vulnerability from variot
There is a Configuration Defect vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22343" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22343" } ] }, "cve": "CVE-2021-22343", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380778", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22343", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22343", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-033", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380778", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22343", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" }, { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration Defect vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22343", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-033", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380778", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22343", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" }, { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "id": "VAR-202107-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380778" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:31.075000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Fixes for configuration error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156102" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22343" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" }, { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" }, { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "VULHUB", "id": "VHN-380778" }, { "date": "2021-07-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22343" }, { "date": "2021-07-01T12:15:07.517000", "db": "NVD", "id": "CVE-2021-22343" }, { "date": "2021-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380778" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22343" }, { "date": "2021-07-06T20:52:15.340000", "db": "NVD", "id": "CVE-2021-22343" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Configuration error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-033" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-033" } ], "trust": 0.6 } }
var-202209-1060
Vulnerability from variot
Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access. Huawei of EMUI and Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1060", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40019" } ] }, "cve": "CVE-2021-40019", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40019", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40019", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-1304", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access. Huawei of EMUI and Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "VULHUB", "id": "VHN-401420" }, { "db": "VULMON", "id": "CVE-2021-40019" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40019", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-020316", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1304", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401420", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40019", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401420" }, { "db": "VULMON", "id": "CVE-2021-40019" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "id": "VAR-202209-1060", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401420" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:41.533000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210488" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401420" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40019" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40019/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401420" }, { "db": "VULMON", "id": "CVE-2021-40019" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401420" }, { "db": "VULMON", "id": "CVE-2021-40019" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-401420" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40019" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "date": "2022-09-16T18:15:11.497000", "db": "NVD", "id": "CVE-2021-40019" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-401420" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40019" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "date": "2022-09-20T17:59:46.090000", "db": "NVD", "id": "CVE-2021-40019" }, { "date": "2022-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1304" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020316" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1304" } ], "trust": 0.6 } }
var-202206-0865
Vulnerability from variot
Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI contains a vulnerability related to the deletion of sensitive information prior to storage or transmission.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is a security vulnerability in HUAWEI EMUI. The following products and versions are affected: EMUI 11.0.0, Magic UI 4.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0865", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46813" } ] }, "cve": "CVE-2021-46813", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46813", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423546", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46813", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46813", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-1179", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423546", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI contains a vulnerability related to the deletion of sensitive information prior to storage or transmission.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is a security vulnerability in HUAWEI EMUI. The following products and versions are affected: EMUI 11.0.0, Magic UI 4.0.0", "sources": [ { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "VULHUB", "id": "VHN-423546" }, { "db": "VULMON", "id": "CVE-2021-46813" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46813", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012100", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-1179", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51603", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423546", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46813", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "VULMON", "id": "CVE-2021-46813" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "id": "VAR-202206-0865", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423546" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:53.537000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198092" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-212", "trust": 1.1 }, { "problemtype": "Improper removal of important information prior to storage or transfer (CWE-212) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46813" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46813/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "VULMON", "id": "CVE-2021-46813" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "VULMON", "id": "CVE-2021-46813" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423546" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46813" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "date": "2022-06-13T16:15:08.190000", "db": "NVD", "id": "CVE-2021-46813" }, { "date": "2022-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423546" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46813" }, { "date": "2023-08-25T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "date": "2022-06-27T16:11:26.213000", "db": "NVD", "id": "CVE-2021-46813" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability related to deletion of sensitive information before storage or transfer in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012100" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1179" } ], "trust": 0.6 } }
var-202111-1590
Vulnerability from variot
There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have information disclosure vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1590", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37034" } ] }, "cve": "CVE-2021-37034", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37034", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398867", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37034", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37034", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1899", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398867", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398867" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have information disclosure vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "VULHUB", "id": "VHN-398867" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37034", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015512", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1899", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102860", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398867", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398867" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "id": "VAR-202111-1590", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398867" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.641000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172196" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37034" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398867" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398867" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398867" }, { "date": "2022-11-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "date": "2021-11-23T16:15:09.880000", "db": "NVD", "id": "CVE-2021-37034" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398867" }, { "date": "2022-11-22T09:12:00", "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "date": "2021-12-09T17:57:50.037000", "db": "NVD", "id": "CVE-2021-37034" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1899" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015512" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1899" } ], "trust": 0.6 } }
var-202210-0122
Vulnerability from variot
The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0122", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38984" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38984" } ] }, "cve": "CVE-2022-38984", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38984", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-185", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "VULHUB", "id": "VHN-434763" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38984", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-185", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434763", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "id": "VAR-202210-0122", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434763" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:14.216000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211161" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "NVD", "id": "CVE-2022-38984" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38984/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434763" }, { "db": "NVD", "id": "CVE-2022-38984" }, { "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434763" }, { "date": "2022-10-14T16:15:15.293000", "db": "NVD", "id": "CVE-2022-38984" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434763" }, { "date": "2022-10-18T15:04:27.097000", "db": "NVD", "id": "CVE-2022-38984" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-185" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-185" } ], "trust": 0.6 } }
var-202209-0200
Vulnerability from variot
Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0200", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40024" } ] }, "cve": "CVE-2021-40024", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40024", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40024", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-217", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40024", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-020314", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-217", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81254", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401425", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40024", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "id": "VAR-202209-0200", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401425" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:45.115000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208411" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40024" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40024/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401425" }, { "db": "VULMON", "id": "CVE-2021-40024" }, { "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "db": "NVD", "id": "CVE-2021-40024" }, { "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-401425" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40024" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "date": "2022-09-16T18:15:11.580000", "db": "NVD", "id": "CVE-2021-40024" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-401425" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40024" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-020314" }, { "date": "2022-09-20T16:58:52.297000", "db": "NVD", "id": "CVE-2021-40024" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-217" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-217" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020314" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-217" } ], "trust": 0.6 } }
var-202110-1484
Vulnerability from variot
There is a Public key verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1484", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36992" } ] }, "cve": "CVE-2021-36992", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36992", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398825", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36992", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36992", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2090", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398825", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398825" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Public key verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "VULHUB", "id": "VHN-398825" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36992", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014266", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2090", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398825", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398825" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "id": "VAR-202110-1484", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398825" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:12.614000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36992", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168228" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36992" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398825" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398825" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398825" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "date": "2021-10-28T13:15:10.657000", "db": "NVD", "id": "CVE-2021-36992" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398825" }, { "date": "2022-10-11T08:57:00", "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "date": "2021-11-01T23:13:21.843000", "db": "NVD", "id": "CVE-2021-36992" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2090" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014266" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2090" } ], "trust": 0.6 } }
var-202112-0346
Vulnerability from variot
There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an authentication vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0346", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37054" } ] }, "cve": "CVE-2021-37054", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37054", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398887", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37054", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37054", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2017", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398887", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an authentication vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "VULHUB", "id": "VHN-398887" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37054", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015862", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2017", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398887", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "id": "VAR-202112-0346", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398887" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:24.958000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Identity\u00a0spoofing\u00a0and\u00a0authentication\u00a0bypass\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173785" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37054" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398887" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "date": "2021-12-08T15:15:09.700000", "db": "NVD", "id": "CVE-2021-37054" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398887" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "date": "2021-12-09T17:52:37.077000", "db": "NVD", "id": "CVE-2021-37054" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Authentication Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2017" } ], "trust": 0.6 } }
var-202212-0767
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46322" } ] }, "cve": "CVE-2022-46322", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46322", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46322", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2526", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "VULHUB", "id": "VHN-444292" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46322", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024014", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2526", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444292", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "id": "VAR-202212-0767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444292" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:44.331000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218963" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46322" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46322/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444292" }, { "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "db": "NVD", "id": "CVE-2022-46322" }, { "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444292" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "date": "2022-12-20T21:15:11.740000", "db": "NVD", "id": "CVE-2022-46322" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444292" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024014" }, { "date": "2022-12-24T04:17:30.480000", "db": "NVD", "id": "CVE-2022-46322" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2526" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2526" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024014" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2526" } ], "trust": 0.6 } }
var-202207-0181
Vulnerability from variot
The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0181", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34735" } ] }, "cve": "CVE-2022-34735", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34735", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427082", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34735", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34735", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-408", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427082", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-34735", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34735", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013205", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-408", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52822", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427082", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34735", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "id": "VAR-202207-0181", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427082" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:23.344000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200885" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34735" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34735/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/476.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427082" }, { "db": "VULMON", "id": "CVE-2022-34735" }, { "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "db": "NVD", "id": "CVE-2022-34735" }, { "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427082" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34735" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "date": "2022-07-12T14:15:19.260000", "db": "NVD", "id": "CVE-2022-34735" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427082" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34735" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013205" }, { "date": "2022-07-19T11:42:57.720000", "db": "NVD", "id": "CVE-2022-34735" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-408" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-408" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013205" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-408" } ], "trust": 0.6 } }
var-202204-1111
Vulnerability from variot
The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a privilege escalation vulnerability in the Huawei HarmonyOS WIFI module. The vulnerability stems from an erroneous program calling a high-level native procedure. An attacker could exploit this vulnerability for privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1111", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22258" } ] }, "cve": "CVE-2022-22258", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-22258", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409787", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22258", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22258", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202204-2033", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-409787", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-22258", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a privilege escalation vulnerability in the Huawei HarmonyOS WIFI module. The vulnerability stems from an erroneous program calling a high-level native procedure. An attacker could exploit this vulnerability for privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22258", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007942", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2033", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44621", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409787", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22258", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "id": "VAR-202204-1111", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409787" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:54:54.555000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189781" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22258" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22258/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409787" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22258" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "date": "2022-04-11T20:15:19.747000", "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-30T00:00:00", "db": "VULHUB", "id": "VHN-409787" }, { "date": "2022-09-30T00:00:00", "db": "VULMON", "id": "CVE-2022-22258" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "date": "2022-09-30T13:10:13.337000", "db": "NVD", "id": "CVE-2022-22258" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2033" } ], "trust": 0.6 } }
var-202112-0135
Vulnerability from variot
There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion. Huawei A vulnerability related to lack of freeing memory after expiration exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0135", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37046" } ] }, "cve": "CVE-2021-37046", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37046", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398879", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37046", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37046", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-463", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398879", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion. Huawei A vulnerability related to lack of freeing memory after expiration exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "VULHUB", "id": "VHN-398879" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37046", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015793", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-463", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398879", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "id": "VAR-202112-0135", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398879" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.363000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173135" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37046" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398879" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "date": "2021-12-07T16:15:07.497000", "db": "NVD", "id": "CVE-2021-37046" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398879" }, { "date": "2022-11-30T04:57:00", "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "date": "2021-12-07T19:43:55.347000", "db": "NVD", "id": "CVE-2021-37046" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-463" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to lack of memory release after expiration in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015793" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-463" } ], "trust": 0.6 } }
var-202112-0133
Vulnerability from variot
There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0133", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37055" } ] }, "cve": "CVE-2021-37055", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37055", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398888", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37055", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37055", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-459", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398888", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398888" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "VULHUB", "id": "VHN-398888" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37055", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015784", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-459", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398888", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398888" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "id": "VAR-202112-0133", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398888" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:21.950000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173131" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37055" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398888" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398888" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398888" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "date": "2021-12-07T16:15:07.577000", "db": "NVD", "id": "CVE-2021-37055" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398888" }, { "date": "2022-11-30T03:20:00", "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "date": "2021-12-07T19:51:15.630000", "db": "NVD", "id": "CVE-2021-37055" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-459" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015784" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-459" } ], "trust": 0.6 } }
var-202209-0152
Vulnerability from variot
The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0152", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39007" } ] }, "cve": "CVE-2022-39007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39007", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39007", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-164", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39007", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-164", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434775", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39007", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "id": "VAR-202209-0152", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434775" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:03.618000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208616" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39007" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39007/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434775" }, { "db": "VULMON", "id": "CVE-2022-39007" }, { "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "db": "NVD", "id": "CVE-2022-39007" }, { "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434775" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39007" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "date": "2022-09-16T18:15:18.170000", "db": "NVD", "id": "CVE-2022-39007" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434775" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39007" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017587" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-39007" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-164" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-164" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-164" } ], "trust": 0.6 } }
var-202111-1769
Vulnerability from variot
There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1769", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39974" } ] }, "cve": "CVE-2021-39974", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39974", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401375", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39974", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39974", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2131", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401375", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39974", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017604", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2131", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401375", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39974", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "id": "VAR-202111-1769", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401375" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:59.087000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176792" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39974" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401375" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39974" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "date": "2022-01-03T22:15:10.333000", "db": "NVD", "id": "CVE-2021-39974" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401375" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39974" }, { "date": "2023-01-27T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "date": "2022-01-13T15:52:46.770000", "db": "NVD", "id": "CVE-2021-39974" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2131" } ], "trust": 0.6 } }
var-202203-0974
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0974", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40060" } ] }, "cve": "CVE-2021-40060", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40060", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401461", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40060", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40060", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-975", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401461", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "VULHUB", "id": "VHN-401461" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40060", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018704", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-975", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401461", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "id": "VAR-202203-0974", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401461" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:49.379000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186007" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40060" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40060/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401461" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "date": "2022-03-10T17:43:23.250000", "db": "NVD", "id": "CVE-2021-40060" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401461" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "date": "2022-03-14T16:16:45.387000", "db": "NVD", "id": "CVE-2021-40060" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-975" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018704" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-975" } ], "trust": 0.6 } }
var-202112-0349
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0349", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37051" } ] }, "cve": "CVE-2021-37051", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37051", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398884", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37051", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37051", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2019", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398884", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "VULHUB", "id": "VHN-398884" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37051", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015859", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2019", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398884", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "id": "VAR-202112-0349", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398884" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.199000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Out-of-bounds\u00a0read\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173787" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37051" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398884" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "date": "2021-12-08T15:15:09.533000", "db": "NVD", "id": "CVE-2021-37051" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398884" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "date": "2021-12-09T17:51:12.040000", "db": "NVD", "id": "CVE-2021-37051" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2019" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2019" } ], "trust": 0.6 } }
var-202206-0260
Vulnerability from variot
The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0260", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31758" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31758" } ] }, "cve": "CVE-2022-31758", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-423591", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2022-31758", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31758", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-479", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423591", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31758", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31758", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202206-479", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66182", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423591", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31758", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "id": "VAR-202206-0260", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423591" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:52.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196950" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "NVD", "id": "CVE-2022-31758" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31758/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423591" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31758" }, { "date": "2022-06-13T15:15:10.227000", "db": "NVD", "id": "CVE-2022-31758" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-21T00:00:00", "db": "VULHUB", "id": "VHN-423591" }, { "date": "2022-06-21T00:00:00", "db": "VULMON", "id": "CVE-2022-31758" }, { "date": "2022-06-21T18:08:15.080000", "db": "NVD", "id": "CVE-2022-31758" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Competitive conditional vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 } }
var-202107-1682
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1682", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22433" } ] }, "cve": "CVE-2021-22433", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22433", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380868", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22433", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22433", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2223", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380868", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "VULHUB", "id": "VHN-380868" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22433", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018742", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2223", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380868", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "id": "VAR-202107-1682", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380868" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:15.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171989" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22433/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380868" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "date": "2022-02-25T19:15:10.157000", "db": "NVD", "id": "CVE-2021-22433" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380868" }, { "date": "2023-07-06T01:41:00", "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "date": "2022-03-07T17:58:49.180000", "db": "NVD", "id": "CVE-2021-22433" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2223" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2223" } ], "trust": 0.6 } }
var-202211-0371
Vulnerability from variot
There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0371", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44563" } ] }, "cve": "CVE-2022-44563", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-44563", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44563", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2126", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "VULHUB", "id": "VHN-441954" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44563", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020500", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2126", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441954", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "id": "VAR-202211-0371", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441954" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:40.531000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213970" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44563" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44563/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441954" }, { "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "db": "NVD", "id": "CVE-2022-44563" }, { "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441954" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "date": "2022-11-09T21:15:18.977000", "db": "NVD", "id": "CVE-2022-44563" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441954" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020500" }, { "date": "2022-11-10T13:56:16.547000", "db": "NVD", "id": "CVE-2022-44563" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2126" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Race condition vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020500" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2126" } ], "trust": 0.6 } }
var-202302-0469
Vulnerability from variot
The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0469", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48287" } ] }, "cve": "CVE-2022-48287", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48287", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48287", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-341", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48287", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003374", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-341", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453367", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "id": "VAR-202302-0469", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453367" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:31.540000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225743" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48287 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48287" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48287/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48287" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453367" }, { "db": "VULMON", "id": "CVE-2022-48287" }, { "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "db": "NVD", "id": "CVE-2022-48287" }, { "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453367" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48287" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "date": "2023-02-09T17:15:12.450000", "db": "NVD", "id": "CVE-2022-48287" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453367" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48287" }, { "date": "2023-09-07T01:26:00", "db": "JVNDB", "id": "JVNDB-2023-003374" }, { "date": "2023-02-16T14:20:03.613000", "db": "NVD", "id": "CVE-2022-48287" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-341" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-341" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003374" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-341" } ], "trust": 0.6 } }
var-202302-0393
Vulnerability from variot
The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0393", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48292" } ] }, "cve": "CVE-2022-48292", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48292", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48292", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202302-347", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48292", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003378", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-347", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453372", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48292", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "id": "VAR-202302-0393", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453372" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:16:55.699000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225748" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48292" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48292/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453372" }, { "db": "VULMON", "id": "CVE-2022-48292" }, { "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "db": "NVD", "id": "CVE-2022-48292" }, { "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453372" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48292" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "date": "2023-02-09T17:15:13.260000", "db": "NVD", "id": "CVE-2022-48292" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453372" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48292" }, { "date": "2023-09-07T01:51:00", "db": "JVNDB", "id": "JVNDB-2023-003378" }, { "date": "2023-02-16T19:12:13.887000", "db": "NVD", "id": "CVE-2022-48292" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-347" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-347" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003378" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-347" } ], "trust": 0.6 } }
var-202302-0346
Vulnerability from variot
The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0346", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48300" } ] }, "cve": "CVE-2022-48300", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48300", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48300", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-343", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48300", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003403", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-343", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453380", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48300", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "id": "VAR-202302-0346", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453380" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:41.797000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225744" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48300" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48300/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453380" }, { "db": "VULMON", "id": "CVE-2022-48300" }, { "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "db": "NVD", "id": "CVE-2022-48300" }, { "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453380" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48300" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "date": "2023-02-09T17:15:15.057000", "db": "NVD", "id": "CVE-2022-48300" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453380" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48300" }, { "date": "2023-09-07T03:09:00", "db": "JVNDB", "id": "JVNDB-2023-003403" }, { "date": "2023-02-16T20:10:12.937000", "db": "NVD", "id": "CVE-2022-48300" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-343" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-343" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003403" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-343" } ], "trust": 0.6 } }
var-202110-1492
Vulnerability from variot
There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance. Huawei Smartphones have an authentication vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1492", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22490" } ] }, "cve": "CVE-2021-22490", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22490", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380925", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22490", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22490", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2080", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380925", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance. Huawei Smartphones have an authentication vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "VULHUB", "id": "VHN-380925" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22490", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014311", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2080", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380925", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "id": "VAR-202110-1492", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380925" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:25.226000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22490", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168219" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22490" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380925" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "date": "2021-10-28T13:15:10.267000", "db": "NVD", "id": "CVE-2021-22490" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380925" }, { "date": "2022-10-12T08:32:00", "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "date": "2021-11-01T23:26:05.507000", "db": "NVD", "id": "CVE-2021-22490" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2080" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Authentication Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014311" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2080" } ], "trust": 0.6 } }
var-202205-1066
Vulnerability from variot
Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI EMUI is a mobile operating system developed based on Android. There is a security vulnerability in HUAWEI EMUI/Magic UI, which is caused by a third-party pop-up overlay vulnerability in the iConnect module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-1066", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46788" } ] }, "cve": "CVE-2021-46788", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46788", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-419300", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46788", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46788", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3331", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-419300", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46788", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI EMUI is a mobile operating system developed based on Android. There is a security vulnerability in HUAWEI EMUI/Magic UI, which is caused by a third-party pop-up overlay vulnerability in the iConnect module", "sources": [ { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46788", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009692", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-3331", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-43213", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419300", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46788", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "id": "VAR-202205-1066", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419300" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:08.958000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193837" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46788" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46788/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419300" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46788" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "date": "2022-05-13T15:15:08.570000", "db": "NVD", "id": "CVE-2021-46788" }, { "date": "2022-05-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419300" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2021-46788" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "date": "2022-05-23T18:46:39.300000", "db": "NVD", "id": "CVE-2021-46788" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3331" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009692" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3331" } ], "trust": 0.6 } }
var-202205-0169
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the failure of hiaiserver to strictly verify the validity of the attributes in the model
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0169", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29789" } ] }, "cve": "CVE-2022-29789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29789", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421298", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29789", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29789", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2547", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421298", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. The vulnerability stems from the failure of hiaiserver to strictly verify the validity of the attributes in the model", "sources": [ { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29789", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009632", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2547", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53576", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421298", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29789", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "id": "VAR-202205-0169", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421298" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:42.688000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193768" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29789" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29789/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421298" }, { "db": "VULMON", "id": "CVE-2022-29789" }, { "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "db": "NVD", "id": "CVE-2022-29789" }, { "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29789" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "date": "2022-05-13T15:15:09.743000", "db": "NVD", "id": "CVE-2022-29789" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29789" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009632" }, { "date": "2022-05-23T18:43:11.697000", "db": "NVD", "id": "CVE-2022-29789" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2547" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2547" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009632" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2547" } ], "trust": 0.6 } }
var-202209-1322
Vulnerability from variot
Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1322", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-36601" } ] }, "cve": "CVE-2020-36601", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-36601", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-36601", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-1305", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "VULHUB", "id": "VHN-430127" }, { "db": "VULMON", "id": "CVE-2020-36601" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-36601", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017277", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1305", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430127", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-36601", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430127" }, { "db": "VULMON", "id": "CVE-2020-36601" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "id": "VAR-202209-1322", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430127" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:36.596000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Huawei Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208465" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430127" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36601" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2020-36601/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430127" }, { "db": "VULMON", "id": "CVE-2020-36601" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430127" }, { "db": "VULMON", "id": "CVE-2020-36601" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-430127" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2020-36601" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "date": "2022-09-16T18:15:11.407000", "db": "NVD", "id": "CVE-2020-36601" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-430127" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2020-36601" }, { "date": "2023-10-11T08:56:00", "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "date": "2022-09-20T18:18:41.903000", "db": "NVD", "id": "CVE-2020-36601" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1305" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017277" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1305" } ], "trust": 0.6 } }
var-202209-0306
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0306", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38992" } ] }, "cve": "CVE-2022-38992", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38992", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38992", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-181", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "VULHUB", "id": "VHN-428511" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38992", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016787", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-181", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428511", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "id": "VAR-202209-0306", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428511" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.523000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208085" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38992" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38992/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428511" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "date": "2022-09-16T18:15:17.630000", "db": "NVD", "id": "CVE-2022-38992" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428511" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "date": "2022-09-17T03:46:53.047000", "db": "NVD", "id": "CVE-2022-38992" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ], "trust": 0.6 } }
var-202107-1681
Vulnerability from variot
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1681", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22431" } ] }, "cve": "CVE-2021-22431", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22431", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380866", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22431", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22431", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2224", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380866", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22431", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22431", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018744", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2224", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380866", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "id": "VAR-202107-1681", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380866" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:49.751000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171993" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22431" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22431/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380866" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22431" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "date": "2022-02-25T19:15:09.833000", "db": "NVD", "id": "CVE-2021-22431" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380866" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22431" }, { "date": "2023-07-06T01:45:00", "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "date": "2022-03-07T17:57:53.880000", "db": "NVD", "id": "CVE-2021-22431" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2224" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2224" } ], "trust": 0.6 } }
var-202108-2202
Vulnerability from variot
There is an Incorrect Calculation of Buffer Size Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause kernel exceptions with the code. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have a security flaw that stems from a miscalculated buffer size
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2202", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22415" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22415" } ] }, "cve": "CVE-2021-22415", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380850", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22415", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22415", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-117", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380850", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22415", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" }, { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Incorrect Calculation of Buffer Size Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause kernel exceptions with the code. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have a security flaw that stems from a miscalculated buffer size", "sources": [ { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22415", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-117", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380850", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22415", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" }, { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "id": "VAR-202108-2202", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380850" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:14.135000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159189" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "NVD", "id": "CVE-2021-22415" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22415" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" }, { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" }, { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380850" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22415" }, { "date": "2021-08-02T17:15:14.357000", "db": "NVD", "id": "CVE-2021-22415" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380850" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22415" }, { "date": "2021-12-09T17:55:10.180000", "db": "NVD", "id": "CVE-2021-22415" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-117" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-117" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-117" } ], "trust": 0.6 } }
var-202106-0621
Vulnerability from variot
There is an Integer Overflow Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0621", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22323" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22323" } ] }, "cve": "CVE-2021-22323", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380758", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-22323", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22323", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-1988", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380758", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22323", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" }, { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Overflow Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22323", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1988", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380758", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22323", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" }, { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "id": "VAR-202106-0621", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380758" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:31.723000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156071" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "NVD", "id": "CVE-2021-22323" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22323" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/772.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" }, { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" }, { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380758" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22323" }, { "date": "2021-06-30T15:15:10.323000", "db": "NVD", "id": "CVE-2021-22323" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380758" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22323" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22323" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1988" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1988" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1988" } ], "trust": 0.6 } }
var-202207-0068
Vulnerability from variot
The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0068", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34742" } ] }, "cve": "CVE-2022-34742", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-34742", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427079", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34742", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34742", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-414", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427079", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34742", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013198", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-414", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-61608", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427079", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "id": "VAR-202207-0068", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427079" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:42.681000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200888" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34742" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34742/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427079" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34742" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "date": "2022-07-12T14:15:19.533000", "db": "NVD", "id": "CVE-2022-34742" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-427079" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34742" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "date": "2022-12-12T21:08:43.917000", "db": "NVD", "id": "CVE-2022-34742" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013198" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ], "trust": 0.6 } }
var-202104-1917
Vulnerability from variot
An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages. Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1917", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9149" } ] }, "cve": "CVE-2020-9149", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9149", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-187274", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9149", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9149", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-022", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187274", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-9149", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages. Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9149", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-016441", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202104-022", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187274", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9149", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "id": "VAR-202104-1917", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187274" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:33.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0 Security update \u00a02021 Year 1 Moon", "trust": 0.8, "url": "https://consumer.huawei.com/jp/support/bulletin/2021/1/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146442" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9149" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-01T00:00:00", "db": "VULHUB", "id": "VHN-187274" }, { "date": "2021-04-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9149" }, { "date": "2021-12-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "date": "2021-04-01T18:15:12.543000", "db": "NVD", "id": "CVE-2020-9149" }, { "date": "2021-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-187274" }, { "date": "2021-04-05T00:00:00", "db": "VULMON", "id": "CVE-2020-9149" }, { "date": "2021-12-03T09:05:00", "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "date": "2021-12-09T17:57:49.860000", "db": "NVD", "id": "CVE-2020-9149" }, { "date": "2021-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016441" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-022" } ], "trust": 0.6 } }
var-202202-0767
Vulnerability from variot
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files. EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22448" } ] }, "cve": "CVE-2021-22448", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22448", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380883", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22448", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22448", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202202-2073", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380883", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files. EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "VULHUB", "id": "VHN-380883" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22448", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-006298", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-2073", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380883", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "id": "VAR-202202-0767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380883" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:52.832000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0June\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185118" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-862", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22448" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22448/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380883" }, { "date": "2023-07-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "date": "2022-02-25T19:15:10.770000", "db": "NVD", "id": "CVE-2021-22448" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380883" }, { "date": "2023-07-04T02:03:00", "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22448" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2073" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006298" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2073" } ], "trust": 0.6 } }
var-202211-1082
Vulnerability from variot
The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1082", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44547" } ] }, "cve": "CVE-2022-44547", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44547", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44547", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2132", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "VULHUB", "id": "VHN-441926" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44547", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020506", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2132", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441926", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "id": "VAR-202211-1082", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441926" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:41.310000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213972" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44547" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44547/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441926" }, { "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "db": "NVD", "id": "CVE-2022-44547" }, { "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441926" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "date": "2022-11-09T21:15:18.003000", "db": "NVD", "id": "CVE-2022-44547" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441926" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020506" }, { "date": "2022-11-10T13:50:42.190000", "db": "NVD", "id": "CVE-2022-44547" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2132" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2132" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020506" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2132" } ], "trust": 0.6 } }
var-202110-1417
Vulnerability from variot
There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1417", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22406" } ] }, "cve": "CVE-2021-22406", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22406", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380841", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22406", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22406", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2037", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380841", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380841" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "VULHUB", "id": "VHN-380841" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22406", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014460", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2037", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380841", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380841" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "id": "VAR-202110-1417", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380841" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:11.901000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168386" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22406" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380841" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380841" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380841" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "date": "2021-10-28T13:15:08.680000", "db": "NVD", "id": "CVE-2021-22406" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380841" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-22406" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2037" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014460" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2037" } ], "trust": 0.6 } }
var-202211-0676
Vulnerability from variot
There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing. Huawei of HarmonyOS and EMUI There is a vulnerability in improper default permissions.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0676", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44548" } ] }, "cve": "CVE-2022-44548", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44548", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44548", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2131", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing. Huawei of HarmonyOS and EMUI There is a vulnerability in improper default permissions.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "VULHUB", "id": "VHN-441928" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44548", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020505", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2131", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441928", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "id": "VAR-202211-0676", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441928" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:13.303000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213635" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44548" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44548/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441928" }, { "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "db": "NVD", "id": "CVE-2022-44548" }, { "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441928" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "date": "2022-11-09T21:15:18.067000", "db": "NVD", "id": "CVE-2022-44548" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441928" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020505" }, { "date": "2022-11-10T13:54:39.160000", "db": "NVD", "id": "CVE-2022-44548" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2131" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020505" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2131" } ], "trust": 0.6 } }
var-202101-1004
Vulnerability from variot
There is an Out-of-bounds Write vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability may cause out-of-bounds access to the physical memory. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is obtained and denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1004", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9145" } ] }, "cve": "CVE-2020-9145", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9145", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187270", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9145", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9145", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1046", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187270", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds Write vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability may cause out-of-bounds access to the physical memory. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is obtained and denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "VULHUB", "id": "VHN-187270" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9145", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015439", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1046", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187270", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "id": "VAR-202101-1004", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187270" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:37.419000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139434" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9145" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187270" }, { "date": "2021-09-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "date": "2021-01-13T20:15:12.893000", "db": "NVD", "id": "CVE-2020-9145" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-187270" }, { "date": "2021-09-22T09:11:00", "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "date": "2021-01-19T14:38:21.680000", "db": "NVD", "id": "CVE-2020-9145" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1046" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding out-of-bounds writing on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015439" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1046" } ], "trust": 0.6 } }
var-202205-0439
Vulnerability from variot
The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0439", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46785" } ] }, "cve": "CVE-2021-46785", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46785", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-419297", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-46785", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46785", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202205-2544", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-419297", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46785", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009695", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2544", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-41788", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419297", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46785", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "id": "VAR-202205-0439", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419297" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:58.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=192868" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46785" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46785/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419297" }, { "db": "VULMON", "id": "CVE-2021-46785" }, { "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "db": "NVD", "id": "CVE-2021-46785" }, { "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419297" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46785" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "date": "2022-05-13T15:15:08.410000", "db": "NVD", "id": "CVE-2021-46785" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-419297" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46785" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009695" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-46785" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2544" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2544" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009695" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2544" } ], "trust": 0.6 } }
var-202208-0888
Vulnerability from variot
Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0888", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40040" } ] }, "cve": "CVE-2021-40040", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40040", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40040", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2783", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "VULHUB", "id": "VHN-401441" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40040", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020146", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2783", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81251", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401441", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "id": "VAR-202208-0888", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401441" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:47.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204272" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40040" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40040/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401441" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "date": "2022-08-10T20:15:22.443000", "db": "NVD", "id": "CVE-2021-40040" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-401441" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "date": "2022-10-27T19:04:30.717000", "db": "NVD", "id": "CVE-2021-40040" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ], "trust": 0.6 } }
var-202101-1000
Vulnerability from variot
There is a vulnerability with buffer access with incorrect length value in some Huawei Smartphone.Unauthorized users may trigger code execution when a buffer overflow occurs. plural Huawei A buffer error vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1000", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9140" } ] }, "cve": "CVE-2020-9140", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9140", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187265", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9140", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9140", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1099", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187265", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability with buffer access with incorrect length value in some Huawei Smartphone.Unauthorized users may trigger code execution when a buffer overflow occurs. plural Huawei A buffer error vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "VULHUB", "id": "VHN-187265" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9140", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015406", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1099", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04719", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-187265", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "id": "VAR-202101-1000", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187265" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:18:00.576000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Huawei smartphone mitigation buffer error vulnerability repair measures", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139459" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-787", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9140" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187265" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "date": "2021-01-13T22:15:14.020000", "db": "NVD", "id": "CVE-2020-9140" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "VULHUB", "id": "VHN-187265" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-9140" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1099" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015406" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1099" } ], "trust": 0.6 } }
var-202207-0110
Vulnerability from variot
The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0110", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34737" } ] }, "cve": "CVE-2022-34737", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-34737", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427081", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34737", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34737", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202207-411", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-427081", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34737", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34737", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013203", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-411", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52821", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427081", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34737", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "id": "VAR-202207-0110", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427081" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:42.359000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199749" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34737" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34737/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427081" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34737" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "date": "2022-07-12T14:15:19.337000", "db": "NVD", "id": "CVE-2022-34737" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427081" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34737" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "date": "2022-07-19T12:23:31.947000", "db": "NVD", "id": "CVE-2022-34737" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013203" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ], "trust": 0.6 } }
var-202202-1310
Vulnerability from variot
There is an improper security permission configuration vulnerability on ACPU.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. (DoS) It may be in a state. Huawei EMUI is an Android-based mobile operating system developed by China's Huawei (Huawei). An attacker could exploit this vulnerability to execute arbitrary code on the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1310", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "db": "NVD", "id": "CVE-2021-39992" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39992" } ] }, "cve": "CVE-2021-39992", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39992", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-401393", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39992", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39992", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202202-858", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401393", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401393" }, { "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "db": "NVD", "id": "CVE-2021-39992" }, { "db": "CNNVD", "id": "CNNVD-202202-858" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper security permission configuration vulnerability on ACPU.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. (DoS) It may be in a state. Huawei EMUI is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei). An attacker could exploit this vulnerability to execute arbitrary code on the system", "sources": [ { "db": "NVD", "id": "CVE-2021-39992" }, { "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "db": "VULHUB", "id": "VHN-401393" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39992", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005389", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-858", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-64482", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401393", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401393" }, { "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "db": "NVD", "id": "CVE-2021-39992" }, { "db": "CNNVD", "id": "CNNVD-202202-858" } ] }, "id": "VAR-202202-1310", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401393" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:38.793000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184119" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "db": "CNNVD", "id": "CNNVD-202202-858" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-732", "trust": 1.1 }, { "problemtype": "Improper permission assignment for critical resources (CWE-732) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401393" }, { "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "db": "NVD", "id": "CVE-2021-39992" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39992" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401393" }, { "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "db": "NVD", "id": "CVE-2021-39992" }, { "db": "CNNVD", "id": "CNNVD-202202-858" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401393" }, { "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "db": "NVD", "id": "CVE-2021-39992" }, { "db": "CNNVD", "id": "CNNVD-202202-858" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401393" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "date": "2022-02-09T23:15:16.190000", "db": "NVD", "id": "CVE-2021-39992" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-858" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401393" }, { "date": "2023-05-30T05:09:00", "db": "JVNDB", "id": "JVNDB-2022-005389" }, { "date": "2022-02-16T01:52:28.310000", "db": "NVD", "id": "CVE-2021-39992" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-858" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-858" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 Vulnerability in improper permission assignment for critical resources in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005389" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-858" } ], "trust": 0.6 } }
var-202112-0352
Vulnerability from variot
There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed. plural Huawei A vulnerability related to use of freed memory exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0352", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37045" } ] }, "cve": "CVE-2021-37045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37045", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398878", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37045", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37045", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2047", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398878", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed. plural Huawei A vulnerability related to use of freed memory exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "VULHUB", "id": "VHN-398878" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37045", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015893", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2047", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398878", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "id": "VAR-202112-0352", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398878" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:39.367000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "UAF\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173800" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37045" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398878" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "date": "2021-12-08T15:15:09.380000", "db": "NVD", "id": "CVE-2021-37045" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398878" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37045" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2047" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to use of freed memory in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2047" } ], "trust": 0.6 } }
var-202203-0975
Vulnerability from variot
There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0975", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40062" } ] }, "cve": "CVE-2021-40062", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40062", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401463", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40062", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40062", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-973", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401463", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "VULHUB", "id": "VHN-401463" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40062", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018702", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-973", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401463", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "id": "VAR-202203-0975", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401463" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:21.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186005" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40062" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40062/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401463" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "date": "2022-03-10T17:43:24.123000", "db": "NVD", "id": "CVE-2021-40062" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401463" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "date": "2022-03-14T16:18:16.900000", "db": "NVD", "id": "CVE-2021-40062" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-973" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018702" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-973" } ], "trust": 0.6 } }
var-202207-0974
Vulnerability from variot
Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an information disclosure vulnerability in HUAWEI EMUI 12.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0974", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40012" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40012" } ] }, "cve": "CVE-2021-40012", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401413", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40012", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40012", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-1044", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401413", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40012", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an information disclosure vulnerability in HUAWEI EMUI 12.0.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40012", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-1044", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52818", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401413", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40012", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "id": "VAR-202207-0974", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401413" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:21.455000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=203734" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "NVD", "id": "CVE-2021-40012" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40012/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401413" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-40012" }, { "date": "2022-07-12T14:15:14.680000", "db": "NVD", "id": "CVE-2021-40012" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-401413" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40012" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40012" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 } }
var-202209-0254
Vulnerability from variot
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0254", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39004" } ] }, "cve": "CVE-2022-39004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39004", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-199", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39004", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-199", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64983", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428496", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39004", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "id": "VAR-202209-0254", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428496" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:55.749000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208092" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39004" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39004/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428496" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39004" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "date": "2022-09-16T18:15:18.053000", "db": "NVD", "id": "CVE-2022-39004" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428496" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39004" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "date": "2022-09-21T12:43:01.093000", "db": "NVD", "id": "CVE-2022-39004" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ], "trust": 0.6 } }
var-202106-1919
Vulnerability from variot
There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1919", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22322" } ] }, "cve": "CVE-2021-22322", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22322", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380757", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22322", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22322", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-234", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380757", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "VULHUB", "id": "VHN-380757" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22322", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007566", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-234", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380757", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "id": "VAR-202106-1919", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380757" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:50.241000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "title": "Repair measures for Huawei smartphone access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153896" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for important features (CWE-306) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22322" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380757" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "date": "2021-06-03T16:15:11.407000", "db": "NVD", "id": "CVE-2021-22322" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380757" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "date": "2021-12-09T17:57:49.440000", "db": "NVD", "id": "CVE-2021-22322" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-234" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding lack of authentication for important functions in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007566" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-234" } ], "trust": 0.6 } }
var-202112-0334
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0334", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37021" } ] }, "cve": "CVE-2021-37021", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37021", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398854", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37021", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37021", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2052", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398854", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "VULHUB", "id": "VHN-398854" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37021", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015759", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2052", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398854", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "id": "VAR-202112-0334", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398854" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.191000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173232" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37021" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398854" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "date": "2021-12-07T17:15:08.343000", "db": "NVD", "id": "CVE-2021-37021" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398854" }, { "date": "2022-11-30T01:39:00", "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37021" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2052" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2052" } ], "trust": 0.6 } }
var-202210-0380
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0380", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41600" } ] }, "cve": "CVE-2022-41600", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41600", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41600", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-152", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "VULHUB", "id": "VHN-437846" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41600", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018788", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-152", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437846", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "id": "VAR-202210-0380", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437846" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:01.457000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210786" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41600" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41600/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437846" }, { "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "db": "NVD", "id": "CVE-2022-41600" }, { "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437846" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "date": "2022-10-14T16:15:28.970000", "db": "NVD", "id": "CVE-2022-41600" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437846" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018788" }, { "date": "2022-10-15T01:56:34.470000", "db": "NVD", "id": "CVE-2022-41600" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-152" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-152" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018788" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-152" } ], "trust": 0.6 } }
var-202203-0266
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0266", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40058" } ] }, "cve": "CVE-2021-40058", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40058", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401459", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40058", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40058", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-977", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401459", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "VULHUB", "id": "VHN-401459" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40058", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018706", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-977", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401459", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "id": "VAR-202203-0266", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401459" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:51.372000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185891" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40058" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40058/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401459" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "date": "2022-03-10T17:43:22.340000", "db": "NVD", "id": "CVE-2021-40058" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401459" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "date": "2022-03-14T16:04:13.283000", "db": "NVD", "id": "CVE-2021-40058" }, { "date": "2022-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-977" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018706" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-977" } ], "trust": 0.6 } }
var-202207-0732
Vulnerability from variot
Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect integrity. HUAWEI EMUI/Magic UI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an authorization issue vulnerability in HUAWEI EMUI/Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0732", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40013" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40013" } ] }, "cve": "CVE-2021-40013", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-401414", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2021-40013", "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40013", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-1045", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401414", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-40013", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" }, { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect integrity. HUAWEI EMUI/Magic UI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an authorization issue vulnerability in HUAWEI EMUI/Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40013", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-1045", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52817", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401414", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40013", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" }, { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "id": "VAR-202207-0732", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401414" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:05.533000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200420" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "NVD", "id": "CVE-2021-40013" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40013/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" }, { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" }, { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401414" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-40013" }, { "date": "2022-07-12T14:15:14.720000", "db": "NVD", "id": "CVE-2021-40013" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-15T00:00:00", "db": "VULHUB", "id": "VHN-401414" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40013" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40013" }, { "date": "2022-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1045" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI EMUI Authorization problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1045" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1045" } ], "trust": 0.6 } }
var-202204-0532
Vulnerability from variot
The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI contains a vulnerability related to insufficient data integrity verification.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0532", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22253" } ] }, "cve": "CVE-2022-22253", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22253", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409782", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22253", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22253", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2020", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409782", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22253", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI contains a vulnerability related to insufficient data integrity verification.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22253", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007945", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2020", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44623", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409782", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22253", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "id": "VAR-202204-0532", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409782" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:01.154000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189779" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-354", "trust": 1.1 }, { "problemtype": "Incomplete data integrity verification (CWE-354) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22253" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22253/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/354.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409782" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22253" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "date": "2022-04-11T20:15:19.523000", "db": "NVD", "id": "CVE-2022-22253" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409782" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22253" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "date": "2022-04-18T20:48:02.157000", "db": "NVD", "id": "CVE-2022-22253" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to insufficient data integrity verification in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007945" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ], "trust": 0.6 } }
var-202205-1188
Vulnerability from variot
Configuration defects in the secure OS module. Successful exploitation of this vulnerability can affect availability. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-1188", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46789" } ] }, "cve": "CVE-2021-46789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46789", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-419301", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46789", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46789", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3330", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-419301", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419301" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability can affect availability. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "VULHUB", "id": "VHN-419301" }, { "db": "VULMON", "id": "CVE-2021-46789" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46789", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009691", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-3330", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-43212", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419301", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46789", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419301" }, { "db": "VULMON", "id": "CVE-2021-46789" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "id": "VAR-202205-1188", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419301" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:58.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193836" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46789" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46789/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419301" }, { "db": "VULMON", "id": "CVE-2021-46789" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419301" }, { "db": "VULMON", "id": "CVE-2021-46789" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46789" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "date": "2022-05-13T15:15:08.617000", "db": "NVD", "id": "CVE-2021-46789" }, { "date": "2022-05-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-01T00:00:00", "db": "VULHUB", "id": "VHN-419301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46789" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "date": "2023-02-01T14:19:39.810000", "db": "NVD", "id": "CVE-2021-46789" }, { "date": "2022-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3330" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009691" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3330" } ], "trust": 0.6 } }
var-202302-0317
Vulnerability from variot
The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0317", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48296" } ] }, "cve": "CVE-2022-48296", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-48296", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48296", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202302-339", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices. EMUI and HarmonyOS contains an improper permissions retention vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48296", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003614", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-339", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453376", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48296", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "id": "VAR-202302-0317", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453376" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:02.123000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225927" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48296" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48296/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453376" }, { "db": "VULMON", "id": "CVE-2022-48296" }, { "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "db": "NVD", "id": "CVE-2022-48296" }, { "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453376" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48296" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "date": "2023-02-09T17:15:14.337000", "db": "NVD", "id": "CVE-2022-48296" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453376" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48296" }, { "date": "2023-09-14T07:27:00", "db": "JVNDB", "id": "JVNDB-2023-003614" }, { "date": "2023-02-17T13:20:07.597000", "db": "NVD", "id": "CVE-2022-48296" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-339" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Permission Preservation Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003614" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-339" } ], "trust": 0.6 } }
var-202206-0936
Vulnerability from variot
Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. The following products and versions are affected: EMUI 12.0.0, EMUI 10.1.0, Magic UI 3.1.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0936", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31754" } ] }, "cve": "CVE-2022-31754", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31754", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423587", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31754", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31754", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-1175", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423587", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31754", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. The following products and versions are affected: EMUI 12.0.0, EMUI 10.1.0, Magic UI 3.1.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31754", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011282", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-1175", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51602", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423587", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31754", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "id": "VAR-202206-0936", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423587" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:38.177000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196788" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31754" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31754/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423587" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31754" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "date": "2022-06-13T16:15:08.670000", "db": "NVD", "id": "CVE-2022-31754" }, { "date": "2022-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423587" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31754" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "date": "2022-06-18T03:13:51.353000", "db": "NVD", "id": "CVE-2022-31754" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011282" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1175" } ], "trust": 0.6 } }
var-202106-0598
Vulnerability from variot
There is an Improper Validation of Array Index Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause stability risks. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0598", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22374" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22374" } ] }, "cve": "CVE-2021-22374", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380809", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22374", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22374", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1994", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380809", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22374", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" }, { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Validation of Array Index Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause stability risks. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones", "sources": [ { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22374", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1994", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380809", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22374", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" }, { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "id": "VAR-202106-0598", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380809" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:41.815000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone input verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156076" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "NVD", "id": "CVE-2021-22374" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22374" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/129.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" }, { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" }, { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380809" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22374" }, { "date": "2021-06-30T15:15:10.477000", "db": "NVD", "id": "CVE-2021-22374" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380809" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22374" }, { "date": "2021-07-06T16:49:44.900000", "db": "NVD", "id": "CVE-2021-22374" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1994" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone input verification error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1994" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1994" } ], "trust": 0.6 } }
var-202107-0368
Vulnerability from variot
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22344" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22344" } ] }, "cve": "CVE-2021-22344", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380779", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22344", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22344", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202107-035", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380779", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22344", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" }, { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22344", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-035", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380779", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22344", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" }, { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "id": "VAR-202107-0368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380779" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:21.798000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156103" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22344" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" }, { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" }, { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "VULHUB", "id": "VHN-380779" }, { "date": "2021-07-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22344" }, { "date": "2021-07-01T12:15:07.553000", "db": "NVD", "id": "CVE-2021-22344" }, { "date": "2021-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380779" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22344" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22344" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Access control error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-035" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-035" } ], "trust": 0.6 } }
var-202302-0455
Vulnerability from variot
The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0455", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48297" } ] }, "cve": "CVE-2022-48297", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48297", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48297", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-351", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access. EMUI and HarmonyOS contains a vulnerability related to improper validation of quantities specified in inputs.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48297", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-351", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453377", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48297", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "id": "VAR-202302-0455", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453377" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:14.668000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225752" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-1284", "trust": 1.0 }, { "problemtype": "Improper validation of quantity specified in input (CWE-1284) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48297" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48297/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453377" }, { "db": "VULMON", "id": "CVE-2022-48297" }, { "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "db": "NVD", "id": "CVE-2022-48297" }, { "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453377" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48297" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "date": "2023-02-09T17:15:14.490000", "db": "NVD", "id": "CVE-2022-48297" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453377" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48297" }, { "date": "2023-09-07T01:53:00", "db": "JVNDB", "id": "JVNDB-2023-003380" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48297" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-351" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-351" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Improper Validation of Quantities Specified in Inputs in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-351" } ], "trust": 0.6 } }
var-202110-1447
Vulnerability from variot
There is a Kernel crash vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones are vulnerable to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1447", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36989" } ] }, "cve": "CVE-2021-36989", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36989", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398821", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36989", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36989", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2087", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398821", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Kernel crash vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones are vulnerable to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "VULHUB", "id": "VHN-398821" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36989", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014305", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2087", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398821", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "id": "VAR-202110-1447", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398821" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:41.926000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36989", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171608" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36989" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398821" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "date": "2021-10-28T13:15:10.530000", "db": "NVD", "id": "CVE-2021-36989" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398821" }, { "date": "2022-10-12T08:18:00", "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "date": "2021-11-01T18:06:44.317000", "db": "NVD", "id": "CVE-2021-36989" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2087" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Default Permission Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014305" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2087" } ], "trust": 0.6 } }
var-202110-1479
Vulnerability from variot
There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1479", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36997" } ] }, "cve": "CVE-2021-36997", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36997", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398830", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36997", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36997", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2096", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398830", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398830" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "VULHUB", "id": "VHN-398830" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36997", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014261", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2096", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398830", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398830" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "id": "VAR-202110-1479", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398830" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.500000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36997", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171622" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36997" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398830" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398830" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398830" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "date": "2021-10-28T13:15:10.873000", "db": "NVD", "id": "CVE-2021-36997" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398830" }, { "date": "2022-10-11T08:42:00", "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "date": "2021-11-01T21:24:27.103000", "db": "NVD", "id": "CVE-2021-36997" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2096" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014261" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2096" } ], "trust": 0.6 } }
var-202209-0367
Vulnerability from variot
The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. Huawei of EMUI , HarmonyOS , Magic UI Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39001" } ] }, "cve": "CVE-2022-39001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39001", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-161", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. Huawei of EMUI , HarmonyOS , Magic UI Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39001", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017593", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-161", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434772", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39001", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "id": "VAR-202209-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434772" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.497000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208615" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39001" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39001/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434772" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39001" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "date": "2022-09-16T18:15:17.937000", "db": "NVD", "id": "CVE-2022-39001" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434772" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39001" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "date": "2022-09-21T12:30:08.660000", "db": "NVD", "id": "CVE-2022-39001" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Past traversal vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ], "trust": 0.6 } }
var-202210-0367
Vulnerability from variot
The HISP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause unauthorized access to the HISP module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" } ] }, "cve": "CVE-2022-39011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39011", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-183", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HISP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause unauthorized access to the HISP module", "sources": [ { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "VULHUB", "id": "VHN-434779" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39011", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-183", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434779", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434779" }, { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "id": "VAR-202210-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434779" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:49.591000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211159" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39011/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434779" }, { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434779" }, { "db": "NVD", "id": "CVE-2022-39011" }, { "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434779" }, { "date": "2022-10-14T16:15:18.057000", "db": "NVD", "id": "CVE-2022-39011" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434779" }, { "date": "2022-10-18T17:37:02.827000", "db": "NVD", "id": "CVE-2022-39011" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-183" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-183" } ], "trust": 0.6 } }
var-202106-0591
Vulnerability from variot
There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to authentication bypass. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0 Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0591", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22367" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22367" } ] }, "cve": "CVE-2021-22367", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380802", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22367", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22367", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-2002", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380802", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22367", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to authentication bypass. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0 Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22367", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2002", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380802", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22367", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "id": "VAR-202106-0591", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380802" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:51.200000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156081" }, { "title": "CVE-2021-22367", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22367 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22367" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22367" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22367" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380802" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22367" }, { "date": "2021-06-30T18:15:08.507000", "db": "NVD", "id": "CVE-2021-22367" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380802" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22367" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-22367" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2002" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2002" } ], "trust": 0.6 } }
var-202112-0351
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0351", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37049" } ] }, "cve": "CVE-2021-37049", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37049", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398882", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37049", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37049", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2021", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398882", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "VULHUB", "id": "VHN-398882" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37049", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015857", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2021", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398882", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "id": "VAR-202112-0351", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398882" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:39.544000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Heap-based\u00a0buffer\u00a0overflow\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173789" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37049" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398882" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "date": "2021-12-08T15:15:09.427000", "db": "NVD", "id": "CVE-2021-37049" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398882" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "date": "2021-12-09T17:59:57.660000", "db": "NVD", "id": "CVE-2021-37049" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2021" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2021" } ], "trust": 0.6 } }
var-202206-0261
Vulnerability from variot
The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31751" } ] }, "cve": "CVE-2022-31751", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31751", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423584", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31751", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31751", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-477", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423584", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31751", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31751", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011284", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-477", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66181", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423584", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31751", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "id": "VAR-202206-0261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423584" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:40.662000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195992" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31751" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31751/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423584" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31751" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "date": "2022-06-13T15:15:10.047000", "db": "NVD", "id": "CVE-2022-31751" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423584" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31751" }, { "date": "2023-08-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "date": "2022-10-05T15:16:52.523000", "db": "NVD", "id": "CVE-2022-31751" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ], "trust": 0.6 } }
var-202106-1929
Vulnerability from variot
There is a Security Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have an information disclosure vulnerability, which stems from configuration errors during the operation of the product
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1929", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22313" } ] }, "cve": "CVE-2021-22313", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22313", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380748", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22313", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22313", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-231", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380748", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380748" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Security Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have an information disclosure vulnerability, which stems from configuration errors during the operation of the product", "sources": [ { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "VULHUB", "id": "VHN-380748" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22313", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007563", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-231", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380748", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380748" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "id": "VAR-202106-1929", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380748" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:26.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "title": "Repair measures for Huawei\u0027s smartphone information leakage vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153893" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22313" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380748" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380748" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380748" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "date": "2021-06-03T16:15:11.323000", "db": "NVD", "id": "CVE-2021-22313" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380748" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "date": "2021-12-09T17:57:49.890000", "db": "NVD", "id": "CVE-2021-22313" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-231" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007563" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-231" } ], "trust": 0.6 } }
var-202107-0369
Vulnerability from variot
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0369", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22347" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22347" } ] }, "cve": "CVE-2021-22347", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380782", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22347", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22347", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202107-031", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380782", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22347", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" }, { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22347", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-031", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380782", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22347", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" }, { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "id": "VAR-202107-0369", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380782" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:19.656000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156100" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22347" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" }, { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" }, { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "VULHUB", "id": "VHN-380782" }, { "date": "2021-07-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22347" }, { "date": "2021-07-01T11:15:07.423000", "db": "NVD", "id": "CVE-2021-22347" }, { "date": "2021-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380782" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22347" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22347" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Access control error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-031" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-031" } ], "trust": 0.6 } }
var-202110-1362
Vulnerability from variot
There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have a path traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1362", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22404" } ] }, "cve": "CVE-2021-22404", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22404", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380839", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22404", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22404", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2035", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380839", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have a path traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "VULHUB", "id": "VHN-380839" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22404", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014172", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2035", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380839", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "id": "VAR-202110-1362", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380839" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:05.686000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=167717" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22404" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380839" }, { "date": "2022-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "date": "2021-10-28T13:15:08.580000", "db": "NVD", "id": "CVE-2021-22404" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380839" }, { "date": "2022-10-06T08:28:00", "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "date": "2021-10-28T20:59:14.587000", "db": "NVD", "id": "CVE-2021-22404" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014172" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2035" } ], "trust": 0.6 } }
var-202110-1854
Vulnerability from variot
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1854", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37119" } ] }, "cve": "CVE-2021-37119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398955", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37119", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37119", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2227", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398955", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37119", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017299", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2227", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04709", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398955", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "id": "VAR-202110-1854", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398955" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:16.744000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176775" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37119" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398955" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37119" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "date": "2022-01-03T22:15:09.450000", "db": "NVD", "id": "CVE-2021-37119" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398955" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37119" }, { "date": "2023-01-13T06:15:00", "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "date": "2022-01-11T19:58:15.363000", "db": "NVD", "id": "CVE-2021-37119" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2227" } ], "trust": 0.6 } }
var-202112-0333
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources. plural Huawei Smartphone products contain an authentication vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0333", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37043" } ] }, "cve": "CVE-2021-37043", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37043", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398876", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37043", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37043", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2064", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398876", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources. plural Huawei Smartphone products contain an authentication vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "VULHUB", "id": "VHN-398876" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37043", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015758", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2064", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398876", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "id": "VAR-202112-0333", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398876" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:00.491000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173239" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37043" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398876" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "date": "2021-12-07T17:15:08.387000", "db": "NVD", "id": "CVE-2021-37043" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398876" }, { "date": "2022-11-30T01:35:00", "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "date": "2021-12-09T17:48:30.133000", "db": "NVD", "id": "CVE-2021-37043" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2064" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Authentication Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2064" } ], "trust": 0.6 } }
var-202301-0474
Vulnerability from variot
The system has a vulnerability that may cause dynamic hiding and restoring of app icons.Successful exploitation of this vulnerability may cause malicious hiding of app icons. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0474", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46761" } ] }, "cve": "CVE-2022-46761", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46761", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46761", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-439", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system has a vulnerability that may cause dynamic hiding and restoring of app icons.Successful exploitation of this vulnerability may cause malicious hiding of app icons. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46761", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001770", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-439", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-447441", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-46761", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "id": "VAR-202301-0474", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-447441" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:38.763000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221316" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46761" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46761/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-447441" }, { "db": "VULMON", "id": "CVE-2022-46761" }, { "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "db": "NVD", "id": "CVE-2022-46761" }, { "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-447441" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-46761" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "date": "2023-01-06T20:15:09.707000", "db": "NVD", "id": "CVE-2022-46761" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-447441" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-46761" }, { "date": "2023-05-09T01:55:00", "db": "JVNDB", "id": "JVNDB-2023-001770" }, { "date": "2023-01-12T17:09:45.867000", "db": "NVD", "id": "CVE-2022-46761" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-439" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-439" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001770" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-439" } ], "trust": 0.6 } }
var-202201-0226
Vulnerability from variot
There is a Configuration defects in Smartphone.Successful exploitation of this vulnerability may elevate the MEID (IMEI) permission. EMUI and Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in HuaWei Smartphone. The vulnerability stems from a configuration flaw in the Smartphone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0226", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37121" } ] }, "cve": "CVE-2021-37121", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37121", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398958", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37121", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37121", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202201-081", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398958", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398958" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration defects in Smartphone.Successful exploitation of this vulnerability may elevate the MEID (IMEI) permission. EMUI and Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in HuaWei Smartphone. The vulnerability stems from a configuration flaw in the Smartphone", "sources": [ { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "VULHUB", "id": "VHN-398958" }, { "db": "VULMON", "id": "CVE-2021-37121" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37121", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002915", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-081", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-05168", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398958", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37121", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398958" }, { "db": "VULMON", "id": "CVE-2021-37121" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "id": "VAR-202201-0226", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398958" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:22.949000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0October\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "title": "HuaWei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176749" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37121" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398958" }, { "db": "VULMON", "id": "CVE-2021-37121" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398958" }, { "db": "VULMON", "id": "CVE-2021-37121" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398958" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37121" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "date": "2022-01-03T22:15:09.550000", "db": "NVD", "id": "CVE-2021-37121" }, { "date": "2022-01-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398958" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37121" }, { "date": "2023-01-27T05:20:00", "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37121" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-081" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002915" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-081" } ], "trust": 0.6 } }
var-202203-0267
Vulnerability from variot
There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI and Magic UI There is a vulnerability in improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0267", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40059" } ] }, "cve": "CVE-2021-40059", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40059", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401460", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40059", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40059", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202203-976", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401460", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI and Magic UI There is a vulnerability in improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "VULHUB", "id": "VHN-401460" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40059", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018705", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-976", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401460", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "id": "VAR-202203-0267", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401460" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:38.075000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Honor Magic Ui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185890" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40059" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40059/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401460" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "date": "2022-03-10T17:43:22.803000", "db": "NVD", "id": "CVE-2021-40059" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401460" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "date": "2022-03-14T16:15:48.380000", "db": "NVD", "id": "CVE-2021-40059" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-976" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018705" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-976" } ], "trust": 0.6 } }
var-202203-0964
Vulnerability from variot
There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability. Huawei of EMUI , HarmonyOS , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0964", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40048" } ] }, "cve": "CVE-2021-40048", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40048", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401449", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40048", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40048", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-996", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401449", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability. Huawei of EMUI , HarmonyOS , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "VULHUB", "id": "VHN-401449" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40048", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018716", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-996", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401449", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "id": "VAR-202203-0964", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401449" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:49.734000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185902" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40048" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40048/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401449" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "date": "2022-03-10T17:43:17.003000", "db": "NVD", "id": "CVE-2021-40048" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401449" }, { "date": "2023-07-05T08:12:00", "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "date": "2022-03-14T15:35:36.367000", "db": "NVD", "id": "CVE-2021-40048" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer size miscalculation vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018716" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ], "trust": 0.6 } }
var-202206-0002
Vulnerability from variot
HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to obtain CPLC information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0002", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46811" } ] }, "cve": "CVE-2021-46811", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46811", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423544", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-46811", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46811", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-468", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423544", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to obtain CPLC information", "sources": [ { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46811", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012101", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-468", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51605", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423544", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46811", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "id": "VAR-202206-0002", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423544" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:22.574000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46811" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46811/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423544" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46811" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "date": "2022-06-13T16:15:08.080000", "db": "NVD", "id": "CVE-2021-46811" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423544" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46811" }, { "date": "2023-08-25T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "date": "2022-06-27T16:09:54.217000", "db": "NVD", "id": "CVE-2021-46811" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-468" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012101" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-468" } ], "trust": 0.6 } }
var-202106-1926
Vulnerability from variot
There is an Improper Validation of Array Index vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute, thus obtaining system permissions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1926", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22333" } ] }, "cve": "CVE-2021-22333", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22333", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380768", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22333", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22333", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-243", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380768", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Validation of Array Index vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute, thus obtaining system permissions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "VULHUB", "id": "VHN-380768" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22333", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007570", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-243", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380768", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "id": "VAR-202106-1926", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380768" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:08.878000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "Repair measures for Huawei mobile phone input verification error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153900" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 }, { "problemtype": "Improper validation of array indexes (CWE-129) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22333" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380768" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "date": "2021-06-03T20:15:08.433000", "db": "NVD", "id": "CVE-2021-22333" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380768" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "date": "2021-12-09T17:57:49.923000", "db": "NVD", "id": "CVE-2021-22333" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-243" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in array index validation on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007570" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-243" } ], "trust": 0.6 } }
var-202110-1361
Vulnerability from variot
There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1361", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22405" } ] }, "cve": "CVE-2021-22405", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22405", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380840", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22405", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22405", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2036", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380840", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22405", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22405", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014171", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2036", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380840", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22405", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "id": "VAR-202110-1361", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380840" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:24.006000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Fixes for configuration error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=167718" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22405" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380840" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22405" }, { "date": "2022-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "date": "2021-10-28T13:15:08.630000", "db": "NVD", "id": "CVE-2021-22405" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380840" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22405" }, { "date": "2022-10-06T08:22:00", "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "date": "2021-10-28T20:58:18.457000", "db": "NVD", "id": "CVE-2021-22405" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2036" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014171" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2036" } ], "trust": 0.6 } }
var-202106-1925
Vulnerability from variot
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause app redirections. Huawei Smartphones contain vulnerabilities related to fraudulent authentication.Information may be tampered with. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Certain Huawei phones contain an access control error vulnerability that could be exploited by an attacker to cause application redirection. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1925", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22334" } ] }, "cve": "CVE-2021-22334", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22334", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-380769", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 4.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22334", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22334", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-244", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380769", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-22334", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause app redirections. Huawei Smartphones contain vulnerabilities related to fraudulent authentication.Information may be tampered with. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Certain Huawei phones contain an access control error vulnerability that could be exploited by an attacker to cause application redirection. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22334", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-007571", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-244", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380769", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22334", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "id": "VAR-202106-1925", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380769" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:41.102000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "Repair measures for vulnerabilities of Huawei mobile phone access control errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153901" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Bad authentication (CWE-863) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22334" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380769" }, { "date": "2021-06-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22334" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "date": "2021-06-03T20:15:08.470000", "db": "NVD", "id": "CVE-2021-22334" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380769" }, { "date": "2021-06-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22334" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22334" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-244" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Fraud related to unauthorized authentication on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007571" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-244" } ], "trust": 0.6 } }
var-202108-2195
Vulnerability from variot
There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei There are race condition vulnerabilities in smartphones.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2195", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22384" } ] }, "cve": "CVE-2021-22384", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22384", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-380819", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22384", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22384", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-102", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380819", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22384", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei There are race condition vulnerabilities in smartphones.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22384", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010878", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-102", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380819", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22384", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "id": "VAR-202108-2195", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380819" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:10.290000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22384", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159076" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22384" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380819" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22384" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "date": "2021-08-02T17:15:13.723000", "db": "NVD", "id": "CVE-2021-22384" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380819" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22384" }, { "date": "2022-07-11T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "date": "2021-12-09T17:55:10.140000", "db": "NVD", "id": "CVE-2021-22384" }, { "date": "2022-03-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-102" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race condition vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010878" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-102" } ], "trust": 0.6 } }
var-202205-0437
Vulnerability from variot
The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0437", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29794" } ] }, "cve": "CVE-2022-29794", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-29794", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-421303", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29794", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29794", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202205-2552", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-421303", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel", "sources": [ { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29794", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009627", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2552", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47652", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421303", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29794", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "id": "VAR-202205-0437", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421303" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:42.161000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193773" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29794" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29794/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421303" }, { "db": "VULMON", "id": "CVE-2022-29794" }, { "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "db": "NVD", "id": "CVE-2022-29794" }, { "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421303" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29794" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "date": "2022-05-13T15:15:09.980000", "db": "NVD", "id": "CVE-2022-29794" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421303" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29794" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009627" }, { "date": "2022-05-23T18:40:33.860000", "db": "NVD", "id": "CVE-2022-29794" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2552" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2552" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009627" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2552" } ], "trust": 0.6 } }
var-202106-1928
Vulnerability from variot
There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Attackers with physical access to the device can thereby exploit this vulnerability. A successful exploitation of this vulnerability can compromise the device's data security and functional availability. Huawei Smartphones are vulnerable to lack of authentication for critical features.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1928", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22316" } ] }, "cve": "CVE-2021-22316", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22316", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380751", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.8, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22316", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22316", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-232", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380751", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Attackers with physical access to the device can thereby exploit this vulnerability. A successful exploitation of this vulnerability can compromise the device\u0027s data security and functional availability. Huawei Smartphones are vulnerable to lack of authentication for critical features.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "VULHUB", "id": "VHN-380751" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22316", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007564", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-232", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380751", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "id": "VAR-202106-1928", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380751" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:10.761000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "title": "Repair measures for Huawei smartphone access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153894" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for important features (CWE-306) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22316" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380751" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "date": "2021-06-03T16:15:11.350000", "db": "NVD", "id": "CVE-2021-22316" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380751" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "date": "2021-12-09T17:57:49.903000", "db": "NVD", "id": "CVE-2021-22316" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding lack of authentication for important functions in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007564" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-232" } ], "trust": 0.6 } }
var-202112-0354
Vulnerability from variot
There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0354", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37039" } ] }, "cve": "CVE-2021-37039", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37039", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-398872", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37039", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37039", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2035", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398872", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "VULHUB", "id": "VHN-398872" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37039", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015890", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2035", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08330", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398872", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "id": "VAR-202112-0354", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398872" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:00.458000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Input\u00a0verification\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173793" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37039" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398872" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "date": "2021-12-08T15:15:09.210000", "db": "NVD", "id": "CVE-2021-37039" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398872" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "date": "2021-12-09T17:52:24.587000", "db": "NVD", "id": "CVE-2021-37039" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2035" } ], "trust": 0.6 } }
var-202112-0355
Vulnerability from variot
There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0355", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37037" } ] }, "cve": "CVE-2021-37037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37037", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398870", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37037", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37037", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2049", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398870", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "VULHUB", "id": "VHN-398870" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37037", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2049", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398870", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "id": "VAR-202112-0355", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398870" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.167000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Invalid\u00a0address\u00a0access\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173802" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37037" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398870" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "date": "2021-12-08T15:15:09.147000", "db": "NVD", "id": "CVE-2021-37037" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398870" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "date": "2021-12-09T17:51:40.283000", "db": "NVD", "id": "CVE-2021-37037" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2049" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2049" } ], "trust": 0.6 } }
var-202209-0142
Vulnerability from variot
The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0142", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39009" } ] }, "cve": "CVE-2022-39009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39009", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39009", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-159", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions. Huawei of EMUI and HarmonyOS There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39009", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017585", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-159", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434776", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39009", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "id": "VAR-202209-0142", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434776" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:39.989000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208614" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39009" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39009/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434776" }, { "db": "VULMON", "id": "CVE-2022-39009" }, { "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "db": "NVD", "id": "CVE-2022-39009" }, { "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434776" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39009" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "date": "2022-09-16T18:15:18.250000", "db": "NVD", "id": "CVE-2022-39009" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434776" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39009" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017585" }, { "date": "2022-09-21T14:03:03.557000", "db": "NVD", "id": "CVE-2022-39009" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-159" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-159" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017585" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-159" } ], "trust": 0.6 } }
var-202211-0419
Vulnerability from variot
The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0419", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" } ] }, "cve": "CVE-2022-44555", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44555", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2121", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable", "sources": [ { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "VULHUB", "id": "VHN-441942" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44555", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2121", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441942", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441942" }, { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "id": "VAR-202211-0419", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441942" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:29.965000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=214351" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44555" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44555/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441942" }, { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441942" }, { "db": "NVD", "id": "CVE-2022-44555" }, { "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441942" }, { "date": "2022-11-09T21:15:18.557000", "db": "NVD", "id": "CVE-2022-44555" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441942" }, { "date": "2022-11-14T19:11:28.647000", "db": "NVD", "id": "CVE-2022-44555" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2121" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2121" } ], "trust": 0.6 } }
var-202106-0597
Vulnerability from variot
There is a Defects Introduced in the Design Process Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0597", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22373" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22373" } ] }, "cve": "CVE-2021-22373", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380808", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22373", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22373", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-1995", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380808", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22373", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" }, { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Defects Introduced in the Design Process Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones", "sources": [ { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22373", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1995", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380808", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22373", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" }, { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "id": "VAR-202106-0597", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380808" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:16.886000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156077" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22373" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22373" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" }, { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" }, { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380808" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22373" }, { "date": "2021-06-30T15:15:10.443000", "db": "NVD", "id": "CVE-2021-22373" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380808" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22373" }, { "date": "2021-07-06T16:24:01.517000", "db": "NVD", "id": "CVE-2021-22373" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1995" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1995" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1995" } ], "trust": 0.6 } }
var-202106-1917
Vulnerability from variot
There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission. Huawei Smartphones contain vulnerabilities in the transmission of important information in clear text.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1917", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22325" } ] }, "cve": "CVE-2021-22325", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22325", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380760", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22325", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22325", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-236", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380760", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission. Huawei Smartphones contain vulnerabilities in the transmission of important information in clear text.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "VULHUB", "id": "VHN-380760" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22325", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007568", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-236", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380760", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "id": "VAR-202106-1917", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380760" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:35.737000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "title": "Repair measures for Huawei\u0027s smartphone information leakage vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153898" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-319", "trust": 1.1 }, { "problemtype": "Sending important information in clear text (CWE-319) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22325" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380760" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "date": "2021-06-03T17:15:07.893000", "db": "NVD", "id": "CVE-2021-22325" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380760" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "date": "2021-12-09T17:57:49.457000", "db": "NVD", "id": "CVE-2021-22325" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-236" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in plaintext transmission of important information on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007568" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-236" } ], "trust": 0.6 } }
var-202206-0024
Vulnerability from variot
Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HarmonyOS 2.0. The vulnerability is due to the pop-up problem after the lock screen of the USSD service customized by the operator
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31760" } ] }, "cve": "CVE-2022-31760", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31760", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423593", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31760", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31760", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202206-472", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-423593", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31760", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HarmonyOS 2.0. The vulnerability is due to the pop-up problem after the lock screen of the USSD service customized by the operator", "sources": [ { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31760", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012033", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-472", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66176", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423593", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31760", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "id": "VAR-202206-0024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423593" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:05.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198079" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31760" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31760/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423593" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31760" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "date": "2022-06-13T16:15:08.770000", "db": "NVD", "id": "CVE-2022-31760" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423593" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2022-31760" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "date": "2022-06-27T16:15:59.833000", "db": "NVD", "id": "CVE-2022-31760" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ], "trust": 0.6 } }
var-202205-0114
Vulnerability from variot
The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash. Huawei of EMUI , Magic UI , HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0114", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46787" } ] }, "cve": "CVE-2021-46787", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46787", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-419299", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46787", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46787", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2555", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-419299", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash. Huawei of EMUI , Magic UI , HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46787", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009693", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2555", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-419299", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46787", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "id": "VAR-202205-0114", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419299" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:43.564000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193776" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46787" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46787/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46787" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "date": "2022-05-13T15:15:08.523000", "db": "NVD", "id": "CVE-2021-46787" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46787" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "date": "2022-05-23T18:47:27.837000", "db": "NVD", "id": "CVE-2021-46787" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ], "trust": 0.6 } }
var-202203-0265
Vulnerability from variot
There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0265", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40057" } ] }, "cve": "CVE-2021-40057", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40057", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401458", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40057", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40057", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-978", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401458", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "VULHUB", "id": "VHN-401458" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40057", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018707", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-978", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401458", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "id": "VAR-202203-0265", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401458" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:09.185000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186008" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40057" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40057/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401458" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "date": "2022-03-10T17:43:21.850000", "db": "NVD", "id": "CVE-2021-40057" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401458" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "date": "2022-03-14T16:02:24.627000", "db": "NVD", "id": "CVE-2021-40057" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-978" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018707" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-978" } ], "trust": 0.6 } }
var-202210-0126
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0126", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41603" } ] }, "cve": "CVE-2022-41603", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41603", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41603", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-159", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "VULHUB", "id": "VHN-437851" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41603", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018785", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-159", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437851", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "id": "VAR-202210-0126", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437851" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:42.536000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210793" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41603" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41603/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437851" }, { "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "db": "NVD", "id": "CVE-2022-41603" }, { "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437851" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "date": "2022-10-14T16:15:30.267000", "db": "NVD", "id": "CVE-2022-41603" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437851" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018785" }, { "date": "2022-10-15T01:58:15.223000", "db": "NVD", "id": "CVE-2022-41603" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-159" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-159" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018785" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-159" } ], "trust": 0.6 } }
var-202108-2199
Vulnerability from variot
There is a Configuration Defect Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have a security flaw that stems from a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2199", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22435" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22435" } ] }, "cve": "CVE-2021-22435", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380870", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22435", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22435", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-122", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380870", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22435", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" }, { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration Defect Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have a security flaw that stems from a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22435", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-122", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380870", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22435", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" }, { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "id": "VAR-202108-2199", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380870" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:32.939000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159054" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22435" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22435" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" }, { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" }, { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380870" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22435" }, { "date": "2021-08-02T17:15:14.480000", "db": "NVD", "id": "CVE-2021-22435" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380870" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22435" }, { "date": "2021-12-09T17:55:10.197000", "db": "NVD", "id": "CVE-2021-22435" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-122" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-122" } ], "trust": 0.6 } }
var-202108-2201
Vulnerability from variot
There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2201", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22427" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22427" } ] }, "cve": "CVE-2021-22427", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-380862", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-22427", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22427", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-118", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380862", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22427", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" }, { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22427", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-118", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380862", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22427", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" }, { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "id": "VAR-202108-2201", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380862" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:44.832000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159190" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "NVD", "id": "CVE-2021-22427" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22427" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" }, { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" }, { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380862" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22427" }, { "date": "2021-08-02T17:15:14.400000", "db": "NVD", "id": "CVE-2021-22427" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380862" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22427" }, { "date": "2021-12-09T17:55:10.187000", "db": "NVD", "id": "CVE-2021-22427" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-118" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-118" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-118" } ], "trust": 0.6 } }
var-202202-0421
Vulnerability from variot
There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality. EMUI Exists in unspecified vulnerabilities.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei). An attacker could exploit this vulnerability to obtain sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0421", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "db": "NVD", "id": "CVE-2021-39991" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39991" } ] }, "cve": "CVE-2021-39991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39991", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-401392", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39991", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39991", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-857", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401392", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401392" }, { "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "db": "NVD", "id": "CVE-2021-39991" }, { "db": "CNNVD", "id": "CNNVD-202202-857" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality. EMUI Exists in unspecified vulnerabilities.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei). An attacker could exploit this vulnerability to obtain sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2021-39991" }, { "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "db": "VULHUB", "id": "VHN-401392" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39991", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005390", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-857", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-64483", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401392", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401392" }, { "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "db": "NVD", "id": "CVE-2021-39991" }, { "db": "CNNVD", "id": "CNNVD-202202-857" } ] }, "id": "VAR-202202-0421", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401392" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:18.020000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "Huawei Emui Fixes for other vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=182487" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "db": "CNNVD", "id": "CNNVD-202202-857" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "db": "NVD", "id": "CVE-2021-39991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39991" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401392" }, { "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "db": "NVD", "id": "CVE-2021-39991" }, { "db": "CNNVD", "id": "CNNVD-202202-857" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401392" }, { "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "db": "NVD", "id": "CVE-2021-39991" }, { "db": "CNNVD", "id": "CNNVD-202202-857" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401392" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "date": "2022-02-09T23:15:16.133000", "db": "NVD", "id": "CVE-2021-39991" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-857" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401392" }, { "date": "2023-05-30T05:11:00", "db": "JVNDB", "id": "JVNDB-2022-005390" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-39991" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-857" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-857" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005390" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-857" } ], "trust": 0.6 } }
var-202108-2203
Vulnerability from variot
There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random kernel address access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2203", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22412" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22412" } ] }, "cve": "CVE-2021-22412", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380847", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22412", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22412", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-113", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380847", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22412", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" }, { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random kernel address access", "sources": [ { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22412", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-113", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380847", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22412", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" }, { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "id": "VAR-202108-2203", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380847" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:20.312000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159186" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "NVD", "id": "CVE-2021-22412" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22412" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" }, { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" }, { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380847" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22412" }, { "date": "2021-08-02T17:15:14.220000", "db": "NVD", "id": "CVE-2021-22412" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380847" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22412" }, { "date": "2021-12-09T17:55:10.177000", "db": "NVD", "id": "CVE-2021-22412" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-113" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-113" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-113" } ], "trust": 0.6 } }
var-202207-0132
Vulnerability from variot
The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0132", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "cve": "CVE-2021-46741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-418650", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-46741", "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46741", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-409", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418650", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46741", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46741", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-409", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-57613", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418650", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46741", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "id": "VAR-202207-0132", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418650" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:38.800000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200693" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46741/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-418650" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-46741" }, { "date": "2022-07-12T14:15:14.857000", "db": "NVD", "id": "CVE-2021-46741" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-418650" }, { "date": "2022-07-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46741" }, { "date": "2022-12-12T21:08:02.043000", "db": "NVD", "id": "CVE-2021-46741" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 } }
var-202211-0418
Vulnerability from variot
The launcher module has an Intent redirection vulnerability. Successful exploitation of this vulnerability may cause launcher module data to be modified
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0418", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" } ] }, "cve": "CVE-2022-44560", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44560", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2125", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The launcher module has an Intent redirection vulnerability. Successful exploitation of this vulnerability may cause launcher module data to be modified", "sources": [ { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "VULHUB", "id": "VHN-441950" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44560", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2125", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441950", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441950" }, { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "id": "VAR-202211-0418", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441950" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:27.207000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213629" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44560" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44560/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441950" }, { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441950" }, { "db": "NVD", "id": "CVE-2022-44560" }, { "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441950" }, { "date": "2022-11-09T21:15:18.803000", "db": "NVD", "id": "CVE-2022-44560" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-17T00:00:00", "db": "VULHUB", "id": "VHN-441950" }, { "date": "2022-11-17T15:16:33.273000", "db": "NVD", "id": "CVE-2022-44560" }, { "date": "2022-11-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2125" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2125" } ], "trust": 0.6 } }
var-202104-1920
Vulnerability from variot
A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios. Huawei Smartphones contain a vulnerability regarding the lack of resource release after a valid lifetime.Denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1920", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9146" } ] }, "cve": "CVE-2020-9146", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 1.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9146", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "VHN-187271", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9146", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9146", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-027", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187271", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-9146", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios. Huawei Smartphones contain a vulnerability regarding the lack of resource release after a valid lifetime.Denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9146", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-016448", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202104-027", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187271", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9146", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "id": "VAR-202104-1920", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187271" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:33.316000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0 Security update \u00a02021 Year 1 Moon", "trust": 0.8, "url": "https://consumer.huawei.com/jp/support/bulletin/2021/1/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146445" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-772", "trust": 1.1 }, { "problemtype": "Lack of resource release after valid lifetime (CWE-772) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9146" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/772.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-01T00:00:00", "db": "VULHUB", "id": "VHN-187271" }, { "date": "2021-04-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9146" }, { "date": "2021-12-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "date": "2021-04-01T18:15:12.293000", "db": "NVD", "id": "CVE-2020-9146" }, { "date": "2021-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-187271" }, { "date": "2021-04-06T00:00:00", "db": "VULMON", "id": "CVE-2020-9146" }, { "date": "2021-12-07T01:44:00", "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "date": "2021-12-09T17:57:49.827000", "db": "NVD", "id": "CVE-2020-9146" }, { "date": "2021-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-027" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding lack of release of resources after valid lifetime on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016448" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-027" } ], "trust": 0.6 } }
var-202111-1770
Vulnerability from variot
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource disclosure vulnerability to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1770", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39969" } ] }, "cve": "CVE-2021-39969", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39969", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401370", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39969", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39969", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2130", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401370", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-39969", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource disclosure vulnerability to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39969", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017612", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2130", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401370", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39969", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "id": "VAR-202111-1770", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401370" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:33.641000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176791" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39969" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401370" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39969" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "date": "2022-01-03T22:15:10.093000", "db": "NVD", "id": "CVE-2021-39969" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401370" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-39969" }, { "date": "2023-01-27T07:14:00", "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-39969" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to resource leakage to the wrong area in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2130" } ], "trust": 0.6 } }
var-202209-0368
Vulnerability from variot
The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39010" } ] }, "cve": "CVE-2022-39010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39010", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39010", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-158", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39010", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017584", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-158", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434778", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39010", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "id": "VAR-202209-0368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434778" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:12.566000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208075" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39010" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39010/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434778" }, { "db": "VULMON", "id": "CVE-2022-39010" }, { "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "db": "NVD", "id": "CVE-2022-39010" }, { "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434778" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39010" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "date": "2022-09-16T18:15:18.287000", "db": "NVD", "id": "CVE-2022-39010" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434778" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39010" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017584" }, { "date": "2022-09-21T14:04:30.277000", "db": "NVD", "id": "CVE-2022-39010" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-158" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-158" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017584" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-158" } ], "trust": 0.6 } }
var-202110-1493
Vulnerability from variot
There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. Huawei Smartphones contain a link interpretation vulnerability.Information may be tampered with. Huawei Smartphone is a smartphone of China's Huawei (Huawei) company.
There is an authorization issue vulnerability in many Huawei devices
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1493", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22488" } ] }, "cve": "CVE-2021-22488", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22488", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-84243", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380923", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22488", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22488", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2021-84243", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2079", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380923", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. Huawei Smartphones contain a link interpretation vulnerability.Information may be tampered with. Huawei Smartphone is a smartphone of China\u0027s Huawei (Huawei) company. \n\r\n\r\nThere is an authorization issue vulnerability in many Huawei devices", "sources": [ { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22488", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-014312", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-84243", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202110-2079", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380923", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "id": "VAR-202110-1493", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" } ] }, "last_update_date": "2023-12-18T13:27:32.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22488", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Patch for Huawei Smartphone Authorization Issue Vulnerability (CNVD-2021-84243)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/296886" }, { "title": "Huawei Smartphone Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168218" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-59", "trust": 1.1 }, { "problemtype": "Link interpretation problem (CWE-59) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22488" }, { "trust": 0.6, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-22488" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "CNVD", "id": "CNVD-2021-84243" }, { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380923" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "date": "2021-10-28T13:15:10.227000", "db": "NVD", "id": "CVE-2021-22488" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "CNVD", "id": "CNVD-2021-84243" }, { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380923" }, { "date": "2022-10-12T08:33:00", "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22488" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2079" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Link Interpretation Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014312" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "post link", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2079" } ], "trust": 0.6 } }
var-202209-1094
Vulnerability from variot
Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. Huawei of EMUI , HarmonyOS , Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1094", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39002" } ] }, "cve": "CVE-2022-39002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39002", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-1277", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. Huawei of EMUI , HarmonyOS , Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017592", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1277", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434773", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "id": "VAR-202209-1094", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434773" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:13.512000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=209481" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39002" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39002/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434773" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39002" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "date": "2022-09-16T18:15:17.977000", "db": "NVD", "id": "CVE-2022-39002" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-03T00:00:00", "db": "VULHUB", "id": "VHN-434773" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39002" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "date": "2022-11-03T20:43:29.643000", "db": "NVD", "id": "CVE-2022-39002" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product double free vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ], "trust": 0.6 } }
var-202210-1039
Vulnerability from variot
The HIPP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause out-of-bounds access to the HIPP module and page table tampering, affecting device confidentiality and availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-1039", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" } ] }, "cve": "CVE-2022-38986", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38986", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-954", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HIPP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause out-of-bounds access to the HIPP module and page table tampering, affecting device confidentiality and availability", "sources": [ { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "VULHUB", "id": "VHN-434765" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38986", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-954", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434765", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434765" }, { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "id": "VAR-202210-1039", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434765" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:31.270000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211185" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38986" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38986/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434765" }, { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434765" }, { "db": "NVD", "id": "CVE-2022-38986" }, { "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434765" }, { "date": "2022-10-14T16:15:16.187000", "db": "NVD", "id": "CVE-2022-38986" }, { "date": "2022-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434765" }, { "date": "2022-10-18T15:43:11.597000", "db": "NVD", "id": "CVE-2022-38986" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-954" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-954" } ], "trust": 0.6 } }
var-202211-0327
Vulnerability from variot
The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0327", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" } ] }, "cve": "CVE-2022-44553", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44553", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202211-2128", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically", "sources": [ { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "VULHUB", "id": "VHN-441938" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44553", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202211-2128", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441938", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441938" }, { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "id": "VAR-202211-0327", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441938" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:26:59.570000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213632" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44553" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44553/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441938" }, { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441938" }, { "db": "NVD", "id": "CVE-2022-44553" }, { "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441938" }, { "date": "2022-11-09T21:15:18.447000", "db": "NVD", "id": "CVE-2022-44553" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-14T00:00:00", "db": "VULHUB", "id": "VHN-441938" }, { "date": "2022-11-14T19:13:52.980000", "db": "NVD", "id": "CVE-2022-44553" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2128" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2128" } ], "trust": 0.6 } }
var-202108-2204
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei A vulnerability exists in smartphones regarding the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2204", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22390" } ] }, "cve": "CVE-2021-22390", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22390", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380825", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22390", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22390", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-108", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380825", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22390", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei A vulnerability exists in smartphones regarding the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22390", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010873", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-108", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380825", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22390", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "id": "VAR-202108-2204", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380825" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:25.460000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22390", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159078" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22390" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380825" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22390" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "date": "2021-08-02T17:15:13.933000", "db": "NVD", "id": "CVE-2021-22390" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380825" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22390" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22390" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-108" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in using free memory on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010873" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-108" } ], "trust": 0.6 } }
var-202203-0263
Vulnerability from variot
There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI and Magic UI Exists in an integer underflow vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0263", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40054" } ] }, "cve": "CVE-2021-40054", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40054", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401455", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40054", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40054", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-981", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401455", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI and Magic UI Exists in an integer underflow vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "VULHUB", "id": "VHN-401455" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40054", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018710", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-981", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401455", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "id": "VAR-202203-0263", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401455" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:22.877000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Fixes for digital error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186010" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-191", "trust": 1.1 }, { "problemtype": "Integer underflow (CWE-191) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40054" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40054/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401455" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "date": "2022-03-10T17:43:20.147000", "db": "NVD", "id": "CVE-2021-40054" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401455" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "date": "2022-03-14T15:51:06.307000", "db": "NVD", "id": "CVE-2021-40054" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-981" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Integer Underflow Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018710" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-981" } ], "trust": 0.6 } }
var-202212-0383
Vulnerability from variot
The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0383", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41599" } ] }, "cve": "CVE-2022-41599", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41599", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41599", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2499", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "VULHUB", "id": "VHN-437842" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41599", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023882", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2499", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437842", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437842" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "id": "VAR-202212-0383", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437842" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:18.733000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218953" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41599" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41599/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437842" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437842" }, { "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "db": "NVD", "id": "CVE-2022-41599" }, { "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437842" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "date": "2022-12-20T21:15:10.957000", "db": "NVD", "id": "CVE-2022-41599" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-437842" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023882" }, { "date": "2022-12-24T04:13:01.250000", "db": "NVD", "id": "CVE-2022-41599" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2499" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2499" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023882" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2499" } ], "trust": 0.6 } }
var-202108-2287
Vulnerability from variot
There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22395" } ] }, "cve": "CVE-2021-22395", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22395", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380830", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22395", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22395", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-2827", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380830", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "VULHUB", "id": "VHN-380830" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22395", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2827", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380830", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "id": "VAR-202108-2287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380830" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:20.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172026" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22395" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22395/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380830" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "date": "2022-02-25T19:15:09.070000", "db": "NVD", "id": "CVE-2021-22395" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380830" }, { "date": "2023-06-30T08:27:00", "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "date": "2022-03-07T17:44:53.277000", "db": "NVD", "id": "CVE-2021-22395" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2827" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Code injection vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2827" } ], "trust": 0.6 } }
var-202209-1235
Vulnerability from variot
Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1235", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39003" } ] }, "cve": "CVE-2022-39003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39003", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39003", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-1276", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "VULHUB", "id": "VHN-434774" }, { "db": "VULMON", "id": "CVE-2022-39003" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39003", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017591", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1276", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434774", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39003", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434774" }, { "db": "VULMON", "id": "CVE-2022-39003" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "id": "VAR-202209-1235", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434774" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:18.432000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208631" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434774" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39003" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39003/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434774" }, { "db": "VULMON", "id": "CVE-2022-39003" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434774" }, { "db": "VULMON", "id": "CVE-2022-39003" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434774" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39003" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "date": "2022-09-16T18:15:18.013000", "db": "NVD", "id": "CVE-2022-39003" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434774" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39003" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "date": "2022-09-21T12:40:40.990000", "db": "NVD", "id": "CVE-2022-39003" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1276" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017591" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1276" } ], "trust": 0.6 } }
var-202106-0599
Vulnerability from variot
There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality,availability and integrity. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0599", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22375" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22375" } ] }, "cve": "CVE-2021-22375", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380810", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22375", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22375", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-1984", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380810", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22375", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" }, { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality,availability and integrity. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22375", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1984", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380810", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22375", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" }, { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "id": "VAR-202106-0599", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380810" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:22.799000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156068" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22375" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" }, { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" }, { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380810" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22375" }, { "date": "2021-06-30T14:15:08.657000", "db": "NVD", "id": "CVE-2021-22375" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380810" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22375" }, { "date": "2021-07-06T15:21:48.367000", "db": "NVD", "id": "CVE-2021-22375" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1984" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1984" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1984" } ], "trust": 0.6 } }
var-202211-0894
Vulnerability from variot
The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0894", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44550" } ] }, "cve": "CVE-2022-44550", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-44550", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44550", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2120", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in a vulnerability related to the use of freed memory.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "VULHUB", "id": "VHN-441932" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44550", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020503", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2120", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441932", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441932" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "id": "VAR-202211-0894", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441932" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:11.630000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213969" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.0 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44550" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44550/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441932" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441932" }, { "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "db": "NVD", "id": "CVE-2022-44550" }, { "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441932" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "date": "2022-11-09T21:15:18.230000", "db": "NVD", "id": "CVE-2022-44550" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441932" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020503" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-44550" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2120" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2120" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020503" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2120" } ], "trust": 0.6 } }
var-202201-1042
Vulnerability from variot
There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. Huawei HarmonyOS , EMUI , Magic UI contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1042", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40037" } ] }, "cve": "CVE-2021-40037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40037", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-401438", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40037", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40037", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-279", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401438", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. Huawei HarmonyOS , EMUI , Magic UI contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "VULHUB", "id": "VHN-401438" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40037", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002909", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-279", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04994", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401438", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "id": "VAR-202201-1042", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401438" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:05.119000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177445" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40037" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401438" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "date": "2022-01-10T14:10:22.520000", "db": "NVD", "id": "CVE-2021-40037" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401438" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "date": "2022-01-13T15:33:36.160000", "db": "NVD", "id": "CVE-2021-40037" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-279" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product type mix-up vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-279" } ], "trust": 0.6 } }
var-202302-0468
Vulnerability from variot
The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0468", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48293" } ] }, "cve": "CVE-2022-48293", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48293", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48293", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202302-345", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48293", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003379", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-345", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453373", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48293", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "id": "VAR-202302-0468", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453373" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:13.108000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225746" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48293" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48293/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453373" }, { "db": "VULMON", "id": "CVE-2022-48293" }, { "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "db": "NVD", "id": "CVE-2022-48293" }, { "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453373" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48293" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "date": "2023-02-09T17:15:13.450000", "db": "NVD", "id": "CVE-2022-48293" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453373" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48293" }, { "date": "2023-09-07T01:52:00", "db": "JVNDB", "id": "JVNDB-2023-003379" }, { "date": "2023-02-16T19:20:47.607000", "db": "NVD", "id": "CVE-2022-48293" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-345" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-345" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003379" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-345" } ], "trust": 0.6 } }
var-202110-1486
Vulnerability from variot
There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones are vulnerable to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1486", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36990" } ] }, "cve": "CVE-2021-36990", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36990", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398823", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36990", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36990", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2088", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398823", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones are vulnerable to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "VULHUB", "id": "VHN-398823" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36990", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014269", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2088", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398823", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "id": "VAR-202110-1486", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398823" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:50.122000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36990", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171616" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36990" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398823" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "date": "2021-10-28T13:15:10.573000", "db": "NVD", "id": "CVE-2021-36990" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398823" }, { "date": "2022-10-11T09:03:00", "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "date": "2021-11-01T23:13:58.830000", "db": "NVD", "id": "CVE-2021-36990" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2088" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Default Permission Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014269" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2088" } ], "trust": 0.6 } }
var-202210-0466
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0466", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41595" } ] }, "cve": "CVE-2022-41595", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41595", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41595", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-155", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "VULHUB", "id": "VHN-437835" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41595", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018791", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-155", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437835", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "id": "VAR-202210-0466", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437835" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:39.634000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210789" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "CWE-476", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41595" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41595/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437835" }, { "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "db": "NVD", "id": "CVE-2022-41595" }, { "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437835" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "date": "2022-10-14T16:15:27.523000", "db": "NVD", "id": "CVE-2022-41595" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437835" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018791" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2022-41595" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-155" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-155" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018791" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-155" } ], "trust": 0.6 } }
var-202212-0590
Vulnerability from variot
The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components. Huawei of HarmonyOS and EMUI There is a vulnerability in deserialization of untrusted data.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0590", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41596" } ] }, "cve": "CVE-2022-41596", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41596", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41596", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2485", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components. Huawei of HarmonyOS and EMUI There is a vulnerability in deserialization of untrusted data.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "VULHUB", "id": "VHN-437836" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41596", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023881", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2485", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "id": "VAR-202212-0590", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437836" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:26:54.755000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218945" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.1 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41596" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41596/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437836" }, { "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "db": "NVD", "id": "CVE-2022-41596" }, { "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437836" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "date": "2022-12-20T21:15:10.910000", "db": "NVD", "id": "CVE-2022-41596" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-437836" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023881" }, { "date": "2022-12-24T04:12:38.470000", "db": "NVD", "id": "CVE-2022-41596" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2485" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2485" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Untrusted Data Deserialization Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023881" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2485" } ], "trust": 0.6 } }
var-202106-1918
Vulnerability from variot
There is a Credentials Management Errors vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei Smartphones are vulnerable to inadequate protection of credentials.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have an authorization issue vulnerability, which stems from the lack of authentication measures or insufficient authentication strength in the product
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1918", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22324" } ] }, "cve": "CVE-2021-22324", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22324", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380759", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22324", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22324", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-235", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380759", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei Smartphones are vulnerable to inadequate protection of credentials.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have an authorization issue vulnerability, which stems from the lack of authentication measures or insufficient authentication strength in the product", "sources": [ { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "VULHUB", "id": "VHN-380759" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22324", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007567", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-235", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380759", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "id": "VAR-202106-1918", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380759" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:24.622000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "title": "Repair measures for Huawei smartphone authorization bugs", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153897" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Inadequate protection of credentials (CWE-522) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-522", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22324" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380759" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "date": "2021-06-03T17:15:07.423000", "db": "NVD", "id": "CVE-2021-22324" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380759" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22324" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-235" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in insufficient protection of authentication information on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007567" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-235" } ], "trust": 0.6 } }
var-202209-1132
Vulnerability from variot
Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1132", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020315" }, { "db": "NVD", "id": "CVE-2021-40023" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40023" } ] }, "cve": "CVE-2021-40023", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40023", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40023", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-1303", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020315" }, { "db": "NVD", "id": "CVE-2021-40023" }, { "db": "CNNVD", "id": "CNNVD-202209-1303" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40023" }, { "db": "JVNDB", "id": "JVNDB-2021-020315" }, { "db": "VULHUB", "id": "VHN-401424" }, { "db": "VULMON", "id": "CVE-2021-40023" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40023", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-020315", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1303", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401424", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40023", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401424" }, { "db": "VULMON", "id": "CVE-2021-40023" }, { "db": "JVNDB", "id": "JVNDB-2021-020315" }, { "db": "NVD", "id": "CVE-2021-40023" }, { "db": "CNNVD", "id": "CNNVD-202209-1303" } ] }, "id": "VAR-202209-1132", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401424" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:18.522000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208463" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1303" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020315" }, { "db": "NVD", "id": "CVE-2021-40023" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40023" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40023/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401424" }, { "db": "VULMON", "id": "CVE-2021-40023" }, { "db": "JVNDB", "id": "JVNDB-2021-020315" }, { "db": "NVD", "id": "CVE-2021-40023" }, { "db": "CNNVD", "id": "CNNVD-202209-1303" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401424" }, { "db": "VULMON", "id": "CVE-2021-40023" }, { "db": "JVNDB", "id": "JVNDB-2021-020315" }, { "db": "NVD", "id": "CVE-2021-40023" }, { "db": "CNNVD", "id": "CNNVD-202209-1303" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-401424" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40023" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020315" }, { "date": "2022-09-16T18:15:11.540000", "db": "NVD", "id": "CVE-2021-40023" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1303" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-401424" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40023" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-020315" }, { "date": "2022-09-20T17:03:21.547000", "db": "NVD", "id": "CVE-2021-40023" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1303" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1303" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020315" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1303" } ], "trust": 0.6 } }
var-202107-0338
Vulnerability from variot
There is a Missing Cryptographic Step vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS of Samgr. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0338", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.2" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9158" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9158" } ] }, "cve": "CVE-2020-9158", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-187283", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-9158", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9158", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202107-032", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-187283", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-9158", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" }, { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing Cryptographic Step vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS of Samgr. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9158", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-032", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-187283", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9158", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" }, { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "id": "VAR-202107-0338", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187283" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:35.422000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156101" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9158" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/1/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" }, { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" }, { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "VULHUB", "id": "VHN-187283" }, { "date": "2021-07-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9158" }, { "date": "2021-07-01T12:15:07.477000", "db": "NVD", "id": "CVE-2020-9158" }, { "date": "2021-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-187283" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2020-9158" }, { "date": "2021-07-06T21:01:19.730000", "db": "NVD", "id": "CVE-2020-9158" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-032" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-032" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-032" } ], "trust": 0.6 } }
var-202212-0588
Vulnerability from variot
The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0588", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46312" } ] }, "cve": "CVE-2022-46312", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46312", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46312", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2495", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "VULHUB", "id": "VHN-444282" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46312", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023885", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2495", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444282", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444282" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "id": "VAR-202212-0588", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444282" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:46.644000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218951" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46312" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46312/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444282" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444282" }, { "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "db": "NVD", "id": "CVE-2022-46312" }, { "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444282" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "date": "2022-12-20T21:15:11.257000", "db": "NVD", "id": "CVE-2022-46312" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444282" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023885" }, { "date": "2022-12-24T04:13:56.900000", "db": "NVD", "id": "CVE-2022-46312" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2495" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2495" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023885" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2495" } ], "trust": 0.6 } }
var-202106-0615
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the kernel to restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0615", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22353" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22353" } ] }, "cve": "CVE-2021-22353", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380788", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22353", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22353", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2000", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380788", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22353", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the kernel to restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones", "sources": [ { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22353", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2000", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380788", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22353", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "id": "VAR-202106-0615", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380788" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:25.724000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156080" }, { "title": "CVE-2021-22353", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22353 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "NVD", "id": "CVE-2021-22353" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22353" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22353" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380788" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22353" }, { "date": "2021-06-30T18:15:08.437000", "db": "NVD", "id": "CVE-2021-22353" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380788" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22353" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22353" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2000" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2000" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2000" } ], "trust": 0.6 } }
var-202301-0558
Vulnerability from variot
The Bluetooth AVRCP module has a vulnerability that can lead to DoS attacks.Successful exploitation of this vulnerability may cause the Bluetooth process to restart. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0558", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-47974" } ] }, "cve": "CVE-2022-47974", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-47974", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-47974", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202301-435", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Bluetooth AVRCP module has a vulnerability that can lead to DoS attacks.Successful exploitation of this vulnerability may cause the Bluetooth process to restart. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-47974", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001768", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-435", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449902", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-47974", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "id": "VAR-202301-0558", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449902" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:38.634000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221312" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-47974" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-47974/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449902" }, { "db": "VULMON", "id": "CVE-2022-47974" }, { "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "db": "NVD", "id": "CVE-2022-47974" }, { "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449902" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2022-47974" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "date": "2023-01-06T20:15:09.830000", "db": "NVD", "id": "CVE-2022-47974" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449902" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2022-47974" }, { "date": "2023-05-09T01:38:00", "db": "JVNDB", "id": "JVNDB-2023-001768" }, { "date": "2023-01-12T16:17:06.877000", "db": "NVD", "id": "CVE-2022-47974" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-435" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-435" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001768" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-435" } ], "trust": 0.6 } }
var-202302-0456
Vulnerability from variot
The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0456", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48289" } ] }, "cve": "CVE-2022-48289", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48289", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48289", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-346", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48289", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003376", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-346", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453369", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48289", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "id": "VAR-202302-0456", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453369" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:33:59.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225747" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48289 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48289" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48289/" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-48289" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453369" }, { "db": "VULMON", "id": "CVE-2022-48289" }, { "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "db": "NVD", "id": "CVE-2022-48289" }, { "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453369" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48289" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "date": "2023-02-09T17:15:12.850000", "db": "NVD", "id": "CVE-2022-48289" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453369" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48289" }, { "date": "2023-09-07T01:48:00", "db": "JVNDB", "id": "JVNDB-2023-003376" }, { "date": "2023-02-16T14:16:21.480000", "db": "NVD", "id": "CVE-2022-48289" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-346" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-346" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003376" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-346" } ], "trust": 0.6 } }
var-202108-2214
Vulnerability from variot
There is a Memory Buffer Errors Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2214", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.2" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22414" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22414" } ] }, "cve": "CVE-2021-22414", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380849", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22414", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22414", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-116", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380849", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22414", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" }, { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Errors Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22414", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-116", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380849", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22414", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" }, { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "id": "VAR-202108-2214", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380849" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:04.829000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159188" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "NVD", "id": "CVE-2021-22414" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22414" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" }, { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" }, { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380849" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22414" }, { "date": "2021-08-02T17:15:14.313000", "db": "NVD", "id": "CVE-2021-22414" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380849" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22414" }, { "date": "2021-12-09T17:55:10.537000", "db": "NVD", "id": "CVE-2021-22414" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-116" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-116" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-116" } ], "trust": 0.6 } }
var-202212-0612
Vulnerability from variot
Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0612", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46319" } ] }, "cve": "CVE-2022-46319", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46319", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46319", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2497", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "VULHUB", "id": "VHN-444289" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46319", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024012", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2497", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444289", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "id": "VAR-202212-0612", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444289" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:10.060000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218952" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46319" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46319/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444289" }, { "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "db": "NVD", "id": "CVE-2022-46319" }, { "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444289" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "date": "2022-12-20T21:15:11.597000", "db": "NVD", "id": "CVE-2022-46319" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444289" }, { "date": "2023-12-01T02:32:00", "db": "JVNDB", "id": "JVNDB-2022-024012" }, { "date": "2022-12-24T04:15:59.840000", "db": "NVD", "id": "CVE-2022-46319" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2497" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2497" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024012" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2497" } ], "trust": 0.6 } }
var-202210-0123
Vulnerability from variot
The HISP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0123", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38998" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38998" } ] }, "cve": "CVE-2022-38998", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38998", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-184", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HISP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "VULHUB", "id": "VHN-434769" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38998", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-184", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434769", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "id": "VAR-202210-0123", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434769" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:32.437000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211160" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "NVD", "id": "CVE-2022-38998" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38998/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434769" }, { "db": "NVD", "id": "CVE-2022-38998" }, { "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-434769" }, { "date": "2022-10-14T16:15:16.623000", "db": "NVD", "id": "CVE-2022-38998" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-434769" }, { "date": "2022-10-18T15:48:51.240000", "db": "NVD", "id": "CVE-2022-38998" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-184" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-184" } ], "trust": 0.6 } }
var-202108-2209
Vulnerability from variot
There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei EMUI/Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2209", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22446" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22446" } ] }, "cve": "CVE-2021-22446", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380881", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22446", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22446", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-131", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380881", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22446", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" }, { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei EMUI/Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22446", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-131", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380881", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22446", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" }, { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "id": "VAR-202108-2209", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380881" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:38.292000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159193" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "NVD", "id": "CVE-2021-22446" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22446" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" }, { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" }, { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380881" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22446" }, { "date": "2021-08-02T18:15:08.607000", "db": "NVD", "id": "CVE-2021-22446" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380881" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22446" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22446" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-131" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-131" } ], "trust": 0.6 } }
var-202202-0419
Vulnerability from variot
There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations. EMUI and Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0419", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40044" } ] }, "cve": "CVE-2021-40044", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40044", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401445", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40044", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40044", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202202-861", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401445", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401445" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations. EMUI and Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "VULHUB", "id": "VHN-401445" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40044", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005384", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-861", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-12804", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401445", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401445" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "id": "VAR-202202-0419", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401445" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:47.033000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184121" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40044" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401445" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401445" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401445" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "date": "2022-02-09T23:15:16.357000", "db": "NVD", "id": "CVE-2021-40044" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401445" }, { "date": "2023-05-30T04:49:00", "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-40044" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-861" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005384" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-861" } ], "trust": 0.6 } }
var-202202-1522
Vulnerability from variot
There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access. EMUI and Magic UI includes an integer overflow vulnerability, and Time-of-check Time-of-use (TOCTOU) There is a race condition vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1522", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22437" } ] }, "cve": "CVE-2021-22437", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.9, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22437", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-380872", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22437", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22437", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202202-2074", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380872", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access. EMUI and Magic UI includes an integer overflow vulnerability, and Time-of-check Time-of-use (TOCTOU) There is a race condition vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "VULHUB", "id": "VHN-380872" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22437", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-006525", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-2074", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380872", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "id": "VAR-202202-1522", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380872" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:38.545000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185119" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "Time-of-check Time-of-use (TOCTOU) Race condition (CWE-367) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-367", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22437" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22437/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380872" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "date": "2022-02-25T19:15:10.470000", "db": "NVD", "id": "CVE-2021-22437" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380872" }, { "date": "2023-07-06T01:26:00", "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-22437" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2074" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006525" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2074" } ], "trust": 0.6 } }
var-202210-0124
Vulnerability from variot
The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0124", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41585" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41585" } ] }, "cve": "CVE-2022-41585", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41585", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-179", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting", "sources": [ { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "VULHUB", "id": "VHN-437818" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41585", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-179", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437818", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "id": "VAR-202210-0124", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437818" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:15.972000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211157" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "NVD", "id": "CVE-2022-41585" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41585/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437818" }, { "db": "NVD", "id": "CVE-2022-41585" }, { "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437818" }, { "date": "2022-10-14T16:15:23.770000", "db": "NVD", "id": "CVE-2022-41585" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437818" }, { "date": "2022-10-18T17:22:58.810000", "db": "NVD", "id": "CVE-2022-41585" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-179" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-179" } ], "trust": 0.6 } }
var-202210-0177
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0177", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41594" } ] }, "cve": "CVE-2022-41594", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41594", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41594", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-156", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "VULHUB", "id": "VHN-437833" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41594", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018792", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-156", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437833", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "id": "VAR-202210-0177", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437833" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:47.211000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210790" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41594" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41594/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437833" }, { "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "db": "NVD", "id": "CVE-2022-41594" }, { "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437833" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "date": "2022-10-14T16:15:27.057000", "db": "NVD", "id": "CVE-2022-41594" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437833" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018792" }, { "date": "2022-10-15T01:54:40.460000", "db": "NVD", "id": "CVE-2022-41594" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-156" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-156" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018792" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-156" } ], "trust": 0.6 } }
var-202106-1923
Vulnerability from variot
There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause leaking of user click data. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1923", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22337" } ] }, "cve": "CVE-2021-22337", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22337", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380772", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22337", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22337", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-251", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380772", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380772" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause leaking of user click data. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "VULHUB", "id": "VHN-380772" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22337", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007573", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-251", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380772", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380772" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "id": "VAR-202106-1923", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380772" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:21.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "HuaWei Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=152911" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22337" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380772" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380772" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380772" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "date": "2021-06-03T20:15:08.530000", "db": "NVD", "id": "CVE-2021-22337" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380772" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "date": "2021-12-09T17:57:49.963000", "db": "NVD", "id": "CVE-2021-22337" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-251" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007573" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-251" } ], "trust": 0.6 } }
var-202210-0414
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0414", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41602" } ] }, "cve": "CVE-2022-41602", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41602", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41602", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-150", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "VULHUB", "id": "VHN-437850" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41602", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018786", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-150", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437850", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "id": "VAR-202210-0414", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437850" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:42.542000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210784" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41602" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41602/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437850" }, { "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "db": "NVD", "id": "CVE-2022-41602" }, { "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437850" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "date": "2022-10-14T16:15:29.810000", "db": "NVD", "id": "CVE-2022-41602" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437850" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018786" }, { "date": "2022-10-15T01:57:57.243000", "db": "NVD", "id": "CVE-2022-41602" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-150" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-150" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018786" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-150" } ], "trust": 0.6 } }
var-202104-1918
Vulnerability from variot
An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages. Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1918", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9148" } ] }, "cve": "CVE-2020-9148", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9148", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-187273", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9148", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9148", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-024", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187273", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-9148", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages. Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9148", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-016440", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202104-024", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187273", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9148", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "id": "VAR-202104-1918", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187273" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:18.753000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0 Security update \u00a02021 Year 1 Moon", "trust": 0.8, "url": "https://consumer.huawei.com/jp/support/bulletin/2021/1/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146443" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9148" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-01T00:00:00", "db": "VULHUB", "id": "VHN-187273" }, { "date": "2021-04-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9148" }, { "date": "2021-12-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "date": "2021-04-01T18:15:12.480000", "db": "NVD", "id": "CVE-2020-9148" }, { "date": "2021-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-187273" }, { "date": "2021-04-05T00:00:00", "db": "VULMON", "id": "CVE-2020-9148" }, { "date": "2021-12-03T09:05:00", "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "date": "2021-12-09T17:57:49.850000", "db": "NVD", "id": "CVE-2020-9148" }, { "date": "2021-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-024" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016440" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-024" } ], "trust": 0.6 } }
var-202112-0285
Vulnerability from variot
There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting. plural Huawei Smartphone products contain an argument injection or modification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0285", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37040" } ] }, "cve": "CVE-2021-37040", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37040", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37040", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37040", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2050", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398873", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting. plural Huawei Smartphone products contain an argument injection or modification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "VULHUB", "id": "VHN-398873" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37040", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015891", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2050", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08329", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398873", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "id": "VAR-202112-0285", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398873" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Parameter\u00a0injection\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173803" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.1 }, { "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-74", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37040" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398873" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "date": "2021-12-08T15:15:09.267000", "db": "NVD", "id": "CVE-2021-37040" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398873" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37040" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2050" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Argument insertion or modification vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "parameter injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2050" } ], "trust": 0.6 } }
var-202201-0227
Vulnerability from variot
There is a Double free vulnerability in Smartphone.Successful exploitation of this vulnerability may cause a kernel crash or privilege escalation. EMUI and Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). The Huawei Smartphone has a buffer error vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0227", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37120" } ] }, "cve": "CVE-2021-37120", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37120", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398957", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37120", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37120", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202201-080", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398957", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Double free vulnerability in Smartphone.Successful exploitation of this vulnerability may cause a kernel crash or privilege escalation. EMUI and Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). The Huawei Smartphone has a buffer error vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "VULHUB", "id": "VHN-398957" }, { "db": "VULMON", "id": "CVE-2021-37120" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37120", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002916", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-080", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-05167", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398957", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37120", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "VULMON", "id": "CVE-2021-37120" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "id": "VAR-202201-0227", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398957" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:16.087000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0October\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176748" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37120" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "VULMON", "id": "CVE-2021-37120" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "VULMON", "id": "CVE-2021-37120" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398957" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37120" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "date": "2022-01-03T22:15:09.500000", "db": "NVD", "id": "CVE-2021-37120" }, { "date": "2022-01-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398957" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37120" }, { "date": "2023-01-27T05:21:00", "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "date": "2022-01-13T15:54:39.633000", "db": "NVD", "id": "CVE-2021-37120" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-080" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Double release vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002916" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-080" } ], "trust": 0.6 } }
var-202202-0615
Vulnerability from variot
There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality. EMUI , HarmonyOS , Magic UI Exists in a digital signature verification vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0615", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40045" } ] }, "cve": "CVE-2021-40045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40045", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-401446", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40045", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40045", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-442", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401446", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-40045", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality. EMUI , HarmonyOS , Magic UI Exists in a digital signature verification vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40045", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-005383", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-442", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401446", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40045", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "id": "VAR-202202-0615", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401446" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T22:37:14.969000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202202-0000001204253396 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "title": "Huawei HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=182401" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-347", "trust": 1.1 }, { "problemtype": "Improper verification of digital signatures (CWE-347) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40045" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202202-0000001203413350" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/347.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401446" }, { "date": "2022-02-09T00:00:00", "db": "VULMON", "id": "CVE-2021-40045" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "date": "2022-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-442" }, { "date": "2022-02-09T23:15:16.397000", "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401446" }, { "date": "2022-02-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40045" }, { "date": "2023-05-30T04:45:00", "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-442" }, { "date": "2022-02-16T02:33:08.603000", "db": "NVD", "id": "CVE-2021-40045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-442" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Digital Signature Verification Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-442" } ], "trust": 0.6 } }
var-202210-0285
Vulnerability from variot
The storage maintenance and debugging module has an array out-of-bounds read vulnerability.Successful exploitation of this vulnerability will cause incorrect statistics of this module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0285", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41583" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41583" } ] }, "cve": "CVE-2022-41583", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41583", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-172", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The storage maintenance and debugging module has an array out-of-bounds read vulnerability.Successful exploitation of this vulnerability will cause incorrect statistics of this module", "sources": [ { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "VULHUB", "id": "VHN-437814" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41583", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-172", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437814", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "id": "VAR-202210-0285", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437814" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:56.744000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211154" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "NVD", "id": "CVE-2022-41583" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41583/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437814" }, { "db": "NVD", "id": "CVE-2022-41583" }, { "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437814" }, { "date": "2022-10-14T16:15:22.813000", "db": "NVD", "id": "CVE-2022-41583" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437814" }, { "date": "2022-10-18T17:27:17.167000", "db": "NVD", "id": "CVE-2022-41583" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-172" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-172" } ], "trust": 0.6 } }
var-202202-1399
Vulnerability from variot
There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability. EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1399", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40015" } ] }, "cve": "CVE-2021-40015", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 1.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40015", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "VHN-401416", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.0, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.7, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40015", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40015", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-443", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401416", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability. EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "VULHUB", "id": "VHN-401416" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40015", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005385", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-443", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401416", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "id": "VAR-202202-1399", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401416" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:51.678000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202202-0000001204253396 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=182402" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40015" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202202-0000001203413350" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401416" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "date": "2022-02-09T23:15:16.313000", "db": "NVD", "id": "CVE-2021-40015" }, { "date": "2022-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401416" }, { "date": "2023-05-30T04:58:00", "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "date": "2022-02-16T02:19:28.473000", "db": "NVD", "id": "CVE-2021-40015" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-443" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product race condition vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-443" } ], "trust": 0.6 } }
var-202203-0971
Vulnerability from variot
There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0971", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40051" } ] }, "cve": "CVE-2021-40051", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40051", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401452", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40051", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40051", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-987", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401452", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "VULHUB", "id": "VHN-401452" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40051", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018713", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-987", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401452", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "id": "VAR-202203-0971", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401452" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:12.661000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186014" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40051" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40051/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401452" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "date": "2022-03-10T17:43:18.447000", "db": "NVD", "id": "CVE-2021-40051" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401452" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40051" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to resource disclosure to the wrong area in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018713" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ], "trust": 0.6 } }
var-202108-2288
Vulnerability from variot
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2288", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22489" } ] }, "cve": "CVE-2021-22489", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22489", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380924", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22489", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22489", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-2826", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380924", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "VULHUB", "id": "VHN-380924" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22489", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018971", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2826", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380924", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "id": "VAR-202108-2288", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380924" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:25.414000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172020" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22489" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22489/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380924" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "date": "2022-02-25T19:15:11.340000", "db": "NVD", "id": "CVE-2021-22489" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-380924" }, { "date": "2023-07-12T07:22:00", "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "date": "2022-03-08T13:52:39.587000", "db": "NVD", "id": "CVE-2021-22489" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2826" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2826" } ], "trust": 0.6 } }
var-202110-1490
Vulnerability from variot
There is a Code injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may exhaust system resources and cause the system to restart. Huawei Smartphones have a code injection vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1490", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36985" } ] }, "cve": "CVE-2021-36985", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36985", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398817", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36985", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36985", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2082", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398817", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Code injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may exhaust system resources and cause the system to restart. Huawei Smartphones have a code injection vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "VULHUB", "id": "VHN-398817" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36985", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014309", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2082", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398817", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "id": "VAR-202110-1490", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398817" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:16.097000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36985", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171583" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-770", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36985" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398817" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "date": "2021-10-28T13:15:10.357000", "db": "NVD", "id": "CVE-2021-36985" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-398817" }, { "date": "2022-10-12T08:25:00", "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-36985" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2082" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Code injection vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014309" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2082" } ], "trust": 0.6 } }
var-202210-0400
Vulnerability from variot
The communication framework module has a vulnerability of not truncating data properly.Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0400", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" } ] }, "cve": "CVE-2022-41586", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41586", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-163", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication framework module has a vulnerability of not truncating data properly.Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "VULHUB", "id": "VHN-437819" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41586", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-163", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437819", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437819" }, { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "id": "VAR-202210-0400", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437819" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:29.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211147" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41586" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41586/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437819" }, { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437819" }, { "db": "NVD", "id": "CVE-2022-41586" }, { "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437819" }, { "date": "2022-10-14T16:15:24.217000", "db": "NVD", "id": "CVE-2022-41586" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437819" }, { "date": "2022-10-18T17:15:43.630000", "db": "NVD", "id": "CVE-2022-41586" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-163" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-163" } ], "trust": 0.6 } }
var-202212-0649
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0649", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46326" } ] }, "cve": "CVE-2022-46326", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46326", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46326", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2513", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "VULHUB", "id": "VHN-444296" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46326", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024017", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2513", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444296", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "id": "VAR-202212-0649", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444296" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:08.296000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218959" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46326" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46326/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444296" }, { "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "db": "NVD", "id": "CVE-2022-46326" }, { "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444296" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "date": "2022-12-20T21:15:11.937000", "db": "NVD", "id": "CVE-2022-46326" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444296" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024017" }, { "date": "2022-12-24T04:17:06.690000", "db": "NVD", "id": "CVE-2022-46326" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2513" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2513" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024017" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2513" } ], "trust": 0.6 } }
var-202201-1017
Vulnerability from variot
There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality. EMUI and Magic UI Exists in an out-of-bounds read vulnerability.Information may be obtained. The Huawei Smartphone is a smartphone from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1017", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40020" } ] }, "cve": "CVE-2021-40020", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40020", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-12805", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401421", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40020", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40020", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-12805", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-567", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401421", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality. EMUI and Magic UI Exists in an out-of-bounds read vulnerability.Information may be obtained. The Huawei Smartphone is a smartphone from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40020", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002903", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-12805", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-567", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401421", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "id": "VAR-202201-1017", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" } ] }, "last_update_date": "2023-12-18T12:16:00.206000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "title": "Patch for Huawei Smartphone Buffer Overflow Vulnerability (CNVD-2022-12805)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/321021" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178043" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40020" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-20T00:00:00", "db": "CNVD", "id": "CNVD-2022-12805" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401421" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "date": "2022-01-10T14:10:21.557000", "db": "NVD", "id": "CVE-2021-40020" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-21T00:00:00", "db": "CNVD", "id": "CNVD-2022-12805" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401421" }, { "date": "2023-01-25T09:02:00", "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "date": "2022-01-13T03:12:21.883000", "db": "NVD", "id": "CVE-2021-40020" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-567" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002903" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-567" } ], "trust": 0.6 } }
var-202111-1583
Vulnerability from variot
There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are remote DoS vulnerabilities in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1583", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37035" } ] }, "cve": "CVE-2021-37035", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37035", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398868", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37035", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37035", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1898", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398868", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398868" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are remote DoS vulnerabilities in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "VULHUB", "id": "VHN-398868" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37035", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015511", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1898", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102862", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398868", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398868" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "id": "VAR-202111-1583", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398868" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:19.919000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172195" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37035" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398868" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398868" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398868" }, { "date": "2022-11-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "date": "2021-11-23T16:15:09.933000", "db": "NVD", "id": "CVE-2021-37035" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398868" }, { "date": "2022-11-22T09:09:00", "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "date": "2021-12-09T17:57:49.680000", "db": "NVD", "id": "CVE-2021-37035" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1898" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015511" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1898" } ], "trust": 0.6 } }
var-202110-1502
Vulnerability from variot
There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have an authentication vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1502", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22473" } ] }, "cve": "CVE-2021-22473", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22473", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380908", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22473", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22473", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2067", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380908", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have an authentication vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "VULHUB", "id": "VHN-380908" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22473", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014321", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2067", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380908", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "id": "VAR-202110-1502", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380908" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:02.287000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22473", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Wearables Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171559" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22473" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380908" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "date": "2021-10-28T13:15:09.790000", "db": "NVD", "id": "CVE-2021-22473" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380908" }, { "date": "2022-10-12T08:53:00", "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "date": "2021-11-02T00:14:32.057000", "db": "NVD", "id": "CVE-2021-22473" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2067" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Authentication Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014321" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2067" } ], "trust": 0.6 } }
var-202110-1709
Vulnerability from variot
There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1709", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22402" } ] }, "cve": "CVE-2021-22402", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22402", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380837", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22402", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22402", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2033", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380837", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380837" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "VULHUB", "id": "VHN-380837" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22402", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014173", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2033", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380837", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380837" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "id": "VAR-202110-1709", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380837" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:18.707000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=167715" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22402" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380837" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380837" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380837" }, { "date": "2022-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "date": "2021-10-28T13:15:08.480000", "db": "NVD", "id": "CVE-2021-22402" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380837" }, { "date": "2022-10-06T08:30:00", "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "date": "2021-12-09T17:57:49.577000", "db": "NVD", "id": "CVE-2021-22402" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014173" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2033" } ], "trust": 0.6 } }
var-202210-0289
Vulnerability from variot
The home screen module has a vulnerability in service logic processing.Successful exploitation of this vulnerability may affect data integrity
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0289", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" } ] }, "cve": "CVE-2022-41588", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41588", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-160", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The home screen module has a vulnerability in service logic processing.Successful exploitation of this vulnerability may affect data integrity", "sources": [ { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "VULHUB", "id": "VHN-437821" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41588", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-160", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437821", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437821" }, { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "id": "VAR-202210-0289", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437821" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:25.604000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211146" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41588" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41588/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437821" }, { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437821" }, { "db": "NVD", "id": "CVE-2022-41588" }, { "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437821" }, { "date": "2022-10-14T16:15:25.250000", "db": "NVD", "id": "CVE-2022-41588" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437821" }, { "date": "2022-10-18T17:11:45.423000", "db": "NVD", "id": "CVE-2022-41588" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-160" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-160" } ], "trust": 0.6 } }
var-202110-1847
Vulnerability from variot
There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1847", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37113" } ] }, "cve": "CVE-2021-37113", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37113", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398949", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37113", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37113", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2234", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398949", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37113", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017592", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2234", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08458", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398949", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37113", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "id": "VAR-202110-1847", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398949" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:41.572000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176782" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37113" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398949" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37113" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "date": "2022-01-03T22:15:09.170000", "db": "NVD", "id": "CVE-2021-37113" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398949" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37113" }, { "date": "2023-01-27T06:03:00", "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37113" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2234" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2234" } ], "trust": 0.6 } }
var-202209-0226
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0226", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38978" } ] }, "cve": "CVE-2022-38978", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38978", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38978", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-187", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "VULHUB", "id": "VHN-428505" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38978", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016794", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-187", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428505", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "id": "VAR-202209-0226", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428505" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:39.896000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208088" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38978" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38978/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428505" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "date": "2022-09-16T18:15:17.350000", "db": "NVD", "id": "CVE-2022-38978" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428505" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "date": "2022-09-17T03:46:58.527000", "db": "NVD", "id": "CVE-2022-38978" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ], "trust": 0.6 } }
var-202108-2206
Vulnerability from variot
There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei An integer overflow vulnerability exists in smartphones.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2206", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22388" } ] }, "cve": "CVE-2021-22388", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22388", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380823", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22388", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22388", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-105", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380823", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22388", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei An integer overflow vulnerability exists in smartphones.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22388", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010874", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-105", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380823", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22388", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "id": "VAR-202108-2206", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380823" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:47.480000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22388", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159077" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22388" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380823" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22388" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "date": "2021-08-02T17:15:13.833000", "db": "NVD", "id": "CVE-2021-22388" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380823" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22388" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "date": "2021-12-09T17:55:10.150000", "db": "NVD", "id": "CVE-2021-22388" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-105" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Integer overflow vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010874" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-105" } ], "trust": 0.6 } }
var-202210-0250
Vulnerability from variot
The security module has configuration defects.Successful exploitation of this vulnerability may affect system availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0250", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" } ] }, "cve": "CVE-2022-41582", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41582", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-173", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The security module has configuration defects.Successful exploitation of this vulnerability may affect system availability", "sources": [ { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "VULHUB", "id": "VHN-437812" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41582", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-173", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437812", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437812" }, { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "id": "VAR-202210-0250", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437812" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:42.425000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211155" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41582" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41582/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437812" }, { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437812" }, { "db": "NVD", "id": "CVE-2022-41582" }, { "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437812" }, { "date": "2022-10-14T16:15:22.447000", "db": "NVD", "id": "CVE-2022-41582" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437812" }, { "date": "2022-10-18T17:32:15.043000", "db": "NVD", "id": "CVE-2022-41582" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-173" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-173" } ], "trust": 0.6 } }
var-202110-1480
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1480", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36996" } ] }, "cve": "CVE-2021-36996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36996", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398829", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-36996", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36996", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2095", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398829", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398829" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "VULHUB", "id": "VHN-398829" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36996", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014262", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2095", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398829", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398829" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "id": "VAR-202110-1480", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398829" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:11.833000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36996", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168232" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36996" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398829" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398829" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398829" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "date": "2021-10-28T13:15:10.830000", "db": "NVD", "id": "CVE-2021-36996" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398829" }, { "date": "2022-10-11T08:46:00", "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "date": "2021-11-01T21:24:06.690000", "db": "NVD", "id": "CVE-2021-36996" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2095" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014262" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2095" } ], "trust": 0.6 } }
var-202205-0436
Vulnerability from variot
The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. Huawei of EMUI , Magic UI , HarmonyOS Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0436", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46786" } ] }, "cve": "CVE-2021-46786", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46786", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-419298", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46786", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46786", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202205-2554", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-419298", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. Huawei of EMUI , Magic UI , HarmonyOS Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel", "sources": [ { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46786", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009694", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2554", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47650", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419298", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46786", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "id": "VAR-202205-0436", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419298" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:04.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193775" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46786" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46786/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46786" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "date": "2022-05-13T15:15:08.467000", "db": "NVD", "id": "CVE-2021-46786" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46786" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "date": "2022-05-23T18:48:58.757000", "db": "NVD", "id": "CVE-2021-46786" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009694" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ], "trust": 0.6 } }
var-202108-2215
Vulnerability from variot
There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2215", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.2" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22413" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22413" } ] }, "cve": "CVE-2021-22413", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380848", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22413", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22413", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-114", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380848", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22413", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" }, { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset", "sources": [ { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22413", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-114", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380848", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22413", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" }, { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "id": "VAR-202108-2215", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380848" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:56.839000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159187" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "NVD", "id": "CVE-2021-22413" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22413" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" }, { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" }, { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380848" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22413" }, { "date": "2021-08-02T17:15:14.267000", "db": "NVD", "id": "CVE-2021-22413" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380848" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22413" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22413" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-114" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI EMUI/Magic UI Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-114" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-114" } ], "trust": 0.6 } }
var-202112-0336
Vulnerability from variot
There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0336", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37056" } ] }, "cve": "CVE-2021-37056", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37056", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398889", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37056", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37056", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-461", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398889", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "VULHUB", "id": "VHN-398889" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37056", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015766", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-461", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398889", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "id": "VAR-202112-0336", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398889" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:11.113000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173133" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.6, "url": "https://consumer.huawei.com/om/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37056" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398889" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "date": "2021-12-07T16:15:07.617000", "db": "NVD", "id": "CVE-2021-37056" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398889" }, { "date": "2022-11-30T02:06:00", "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "date": "2021-12-09T17:55:11.090000", "db": "NVD", "id": "CVE-2021-37056" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-461" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to improper retention of permissions in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015766" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-461" } ], "trust": 0.6 } }
var-202202-1309
Vulnerability from variot
There is a vulnerability of unstrict input parameter verification in the audio assembly.Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1309", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "db": "NVD", "id": "CVE-2021-39997" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39997" } ] }, "cve": "CVE-2021-39997", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39997", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401398", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39997", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39997", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202202-860", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401398", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401398" }, { "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "db": "NVD", "id": "CVE-2021-39997" }, { "db": "CNNVD", "id": "CNNVD-202202-860" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of unstrict input parameter verification in the audio assembly.Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-39997" }, { "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "db": "VULHUB", "id": "VHN-401398" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39997", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005386", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-860", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-12803", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401398", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401398" }, { "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "db": "NVD", "id": "CVE-2021-39997" }, { "db": "CNNVD", "id": "CNNVD-202202-860" } ] }, "id": "VAR-202202-1309", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401398" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:03.204000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "HUAWEI EMUI Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=182490" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "db": "CNNVD", "id": "CNNVD-202202-860" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401398" }, { "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "db": "NVD", "id": "CVE-2021-39997" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39997" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401398" }, { "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "db": "NVD", "id": "CVE-2021-39997" }, { "db": "CNNVD", "id": "CNNVD-202202-860" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401398" }, { "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "db": "NVD", "id": "CVE-2021-39997" }, { "db": "CNNVD", "id": "CNNVD-202202-860" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401398" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "date": "2022-02-09T23:15:16.273000", "db": "NVD", "id": "CVE-2021-39997" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-860" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401398" }, { "date": "2023-05-30T05:04:00", "db": "JVNDB", "id": "JVNDB-2022-005386" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-39997" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-860" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-860" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005386" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-860" } ], "trust": 0.6 } }
var-202209-0278
Vulnerability from variot
Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0278", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46836" } ] }, "cve": "CVE-2021-46836", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46836", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46836", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-213", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46836", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017272", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-213", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64979", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428486", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "id": "VAR-202209-0278", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428486" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:03.509000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208410" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46836" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46836/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428486" }, { "db": "VULMON", "id": "CVE-2021-46836" }, { "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "db": "NVD", "id": "CVE-2021-46836" }, { "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428486" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-46836" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "date": "2022-09-16T18:15:11.757000", "db": "NVD", "id": "CVE-2021-46836" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-428486" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-46836" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2022-017272" }, { "date": "2022-09-20T16:56:03.127000", "db": "NVD", "id": "CVE-2021-46836" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-213" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-213" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017272" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-213" } ], "trust": 0.6 } }
var-202108-2219
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2219", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22381" } ] }, "cve": "CVE-2021-22381", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22381", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380816", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22381", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22381", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-101", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380816", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22381", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS", "sources": [ { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22381", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010877", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-101", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380816", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22381", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "id": "VAR-202108-2219", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380816" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:29.620000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22381", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159075" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22381" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380816" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22381" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "date": "2021-08-02T17:15:13.670000", "db": "NVD", "id": "CVE-2021-22381" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380816" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22381" }, { "date": "2022-07-11T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "date": "2021-12-09T17:55:10.847000", "db": "NVD", "id": "CVE-2021-22381" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-101" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to input confirmation on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010877" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-101" } ], "trust": 0.6 } }
var-202206-0869
Vulnerability from variot
Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is a security vulnerability in HUAWEI EMUI. Attackers can exploit this vulnerability to obtain system secrets. 1. Magic UI 4.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0869", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31761" } ] }, "cve": "CVE-2022-31761", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31761", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423594", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31761", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31761", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-1173", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423594", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423594" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is a security vulnerability in HUAWEI EMUI. Attackers can exploit this vulnerability to obtain system secrets. 1. Magic UI 4.0.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "VULHUB", "id": "VHN-423594" }, { "db": "VULMON", "id": "CVE-2022-31761" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31761", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-1173", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-47647", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423594", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31761", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423594" }, { "db": "VULMON", "id": "CVE-2022-31761" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "id": "VAR-202206-0869", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423594" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:41.148000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196787" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31761" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31761/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423594" }, { "db": "VULMON", "id": "CVE-2022-31761" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423594" }, { "db": "VULMON", "id": "CVE-2022-31761" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423594" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31761" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "date": "2022-06-13T16:15:08.820000", "db": "NVD", "id": "CVE-2022-31761" }, { "date": "2022-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423594" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31761" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "date": "2022-06-18T03:13:57.547000", "db": "NVD", "id": "CVE-2022-31761" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011278" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1173" } ], "trust": 0.6 } }
var-202302-0369
Vulnerability from variot
The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0369", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48302" } ] }, "cve": "CVE-2022-48302", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48302", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48302", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-338", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48302", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003401", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-338", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453382", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48302", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "id": "VAR-202302-0369", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453382" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:31.231000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225741" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48302" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48302/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453382" }, { "db": "VULMON", "id": "CVE-2022-48302" }, { "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "db": "NVD", "id": "CVE-2022-48302" }, { "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453382" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48302" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "date": "2023-02-09T17:15:15.540000", "db": "NVD", "id": "CVE-2022-48302" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453382" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48302" }, { "date": "2023-09-07T03:06:00", "db": "JVNDB", "id": "JVNDB-2023-003401" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-48302" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-338" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-338" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003401" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-338" } ], "trust": 0.6 } }
var-202106-1927
Vulnerability from variot
There is an Improper Control of Generation of Code vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause denial of security services on a rooted device. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1927", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22336" } ] }, "cve": "CVE-2021-22336", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22336", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380771", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22336", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22336", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-238", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380771", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Control of Generation of Code vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause denial of security services on a rooted device. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0", "sources": [ { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "VULHUB", "id": "VHN-380771" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22336", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007569", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-238", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380771", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "id": "VAR-202106-1927", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380771" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:33.864000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "Fix measures for code injection vulnerabilities in some Huawei mobile phones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153899" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22336" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380771" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "date": "2021-06-03T17:15:07.923000", "db": "NVD", "id": "CVE-2021-22336" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380771" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "date": "2021-12-09T17:57:49.913000", "db": "NVD", "id": "CVE-2021-22336" }, { "date": "2021-06-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-238" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Code injection vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007569" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-238" } ], "trust": 0.6 } }
var-202106-0616
Vulnerability from variot
There is an Information Disclosure Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds read. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0616", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22354" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22354" } ] }, "cve": "CVE-2021-22354", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380789", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22354", "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22354", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-2001", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380789", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22354", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds read. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22354", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2001", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380789", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22354", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "id": "VAR-202106-0616", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380789" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:52.444000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155931" }, { "title": "CVE-2021-22354", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22354 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-843", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "NVD", "id": "CVE-2021-22354" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22354" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/843.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22354" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380789" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22354" }, { "date": "2021-06-30T18:15:08.473000", "db": "NVD", "id": "CVE-2021-22354" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-02T00:00:00", "db": "VULHUB", "id": "VHN-380789" }, { "date": "2021-07-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22354" }, { "date": "2021-07-02T14:58:50.503000", "db": "NVD", "id": "CVE-2021-22354" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2001" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2001" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2001" } ], "trust": 0.6 } }
var-202110-1499
Vulnerability from variot
There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1499", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22481" } ] }, "cve": "CVE-2021-22481", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22481", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380916", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22481", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22481", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2071", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380916", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22481", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22481", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014318", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2071", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380916", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22481", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "id": "VAR-202110-1499", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380916" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:55.889000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22481", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171565" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22481" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380916" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22481" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "date": "2021-10-28T13:15:09.927000", "db": "NVD", "id": "CVE-2021-22481" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380916" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22481" }, { "date": "2022-10-12T08:47:00", "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "date": "2021-11-02T00:13:23.913000", "db": "NVD", "id": "CVE-2021-22481" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2071" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014318" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2071" } ], "trust": 0.6 } }
var-202212-0915
Vulnerability from variot
Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0915", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46328" } ] }, "cve": "CVE-2022-46328", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46328", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46328", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2510", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "VULHUB", "id": "VHN-444298" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46328", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023891", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2510", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444298", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "id": "VAR-202212-0915", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444298" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:31.749000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218957" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46328" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46328/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444298" }, { "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "db": "NVD", "id": "CVE-2022-46328" }, { "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444298" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "date": "2022-12-20T21:15:12.037000", "db": "NVD", "id": "CVE-2022-46328" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444298" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023891" }, { "date": "2022-12-24T04:16:40.063000", "db": "NVD", "id": "CVE-2022-46328" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2510" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2510" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2510" } ], "trust": 0.6 } }
var-202201-1016
Vulnerability from variot
There is an Integer overflow vulnerability with ACPU in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI and Magic UI Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Huawei Smartphone is a smartphone from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1016", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39993" } ] }, "cve": "CVE-2021-39993", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39993", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-08047", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401394", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39993", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39993", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2022-08047", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-568", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401394", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer overflow vulnerability with ACPU in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI and Magic UI Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Huawei Smartphone is a smartphone from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39993", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-003115", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-08047", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-568", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401394", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "id": "VAR-202201-1016", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" } ] }, "last_update_date": "2023-12-18T13:12:14.678000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0December\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "title": "Patch for Huawei Smartphone Buffer Overflow Vulnerability (CNVD-2022-08047)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/316841" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178044" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39993" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-30T00:00:00", "db": "CNVD", "id": "CNVD-2022-08047" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401394" }, { "date": "2023-02-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "date": "2022-01-10T14:10:20.773000", "db": "NVD", "id": "CVE-2021-39993" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2022-08047" }, { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401394" }, { "date": "2023-02-08T07:00:00", "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "date": "2022-01-14T16:44:08.930000", "db": "NVD", "id": "CVE-2021-39993" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-568" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003115" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-568" } ], "trust": 0.6 } }
var-202203-0881
Vulnerability from variot
There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0881", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40047" } ] }, "cve": "CVE-2021-40047", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40047", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401448", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40047", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40047", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-1002", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401448", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "VULHUB", "id": "VHN-401448" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40047", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018717", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-1002", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401448", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "id": "VAR-202203-0881", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401448" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:31.039000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185903" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40047" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40047/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401448" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "date": "2022-03-10T17:43:16.463000", "db": "NVD", "id": "CVE-2021-40047" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401448" }, { "date": "2023-07-05T08:12:00", "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "date": "2022-03-14T15:35:04.920000", "db": "NVD", "id": "CVE-2021-40047" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018717" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ], "trust": 0.6 } }
var-202212-0382
Vulnerability from variot
Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0382", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46325" } ] }, "cve": "CVE-2022-46325", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-46325", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46325", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202212-2514", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "VULHUB", "id": "VHN-444295" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46325", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-024018", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2514", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444295", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "id": "VAR-202212-0382", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444295" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:03.880000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218960" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46325" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46325/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444295" }, { "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "db": "NVD", "id": "CVE-2022-46325" }, { "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444295" }, { "date": "2023-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "date": "2022-12-20T21:15:11.887000", "db": "NVD", "id": "CVE-2022-46325" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444295" }, { "date": "2023-12-01T02:33:00", "db": "JVNDB", "id": "JVNDB-2022-024018" }, { "date": "2022-12-24T04:17:17.677000", "db": "NVD", "id": "CVE-2022-46325" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2514" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2514" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-024018" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2514" } ], "trust": 0.6 } }
var-202112-0137
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0137", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37041" } ] }, "cve": "CVE-2021-37041", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37041", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398874", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37041", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37041", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202112-464", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398874", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "VULHUB", "id": "VHN-398874" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37041", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015795", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-464", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398874", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "id": "VAR-202112-0137", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398874" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.756000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173136" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.6, "url": "https://consumer.huawei.com/om/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37041" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398874" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "date": "2021-12-07T16:15:07.417000", "db": "NVD", "id": "CVE-2021-37041" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398874" }, { "date": "2022-11-30T05:08:00", "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37041" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-464" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015795" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-464" } ], "trust": 0.6 } }
var-202110-1475
Vulnerability from variot
There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. Huawei Smartphones contain a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1475", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37002" } ] }, "cve": "CVE-2021-37002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37002", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398833", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37002", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2097", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398833", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-37002", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. Huawei Smartphones contain a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014257", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2097", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398833", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "id": "VAR-202110-1475", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398833" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:07.304000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-37002", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171628" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37002" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398833" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-37002" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "date": "2021-10-28T13:15:11.460000", "db": "NVD", "id": "CVE-2021-37002" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398833" }, { "date": "2021-11-01T00:00:00", "db": "VULMON", "id": "CVE-2021-37002" }, { "date": "2022-10-11T08:29:00", "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "date": "2021-11-01T20:51:15.617000", "db": "NVD", "id": "CVE-2021-37002" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2097" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Buffer Error Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014257" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2097" } ], "trust": 0.6 } }
var-202203-0268
Vulnerability from variot
There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI contains a type confusion vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0268", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40061" } ] }, "cve": "CVE-2021-40061", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40061", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401462", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40061", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40061", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-974", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401462", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI contains a type confusion vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "VULHUB", "id": "VHN-401462" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40061", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018703", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-974", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401462", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "id": "VAR-202203-0268", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401462" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:02.636000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186006" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40061" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40061/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401462" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "date": "2022-03-10T17:43:23.707000", "db": "NVD", "id": "CVE-2021-40061" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401462" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "date": "2022-03-14T16:18:51.173000", "db": "NVD", "id": "CVE-2021-40061" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product type mix-up vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018703" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ], "trust": 0.6 } }
var-202110-1477
Vulnerability from variot
There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution. Huawei Smartphones have a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Successful exploitation could lead to remote code execution
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1477", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36999" } ] }, "cve": "CVE-2021-36999", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36999", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-397932", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36999", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36999", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2099", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-397932", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution. Huawei Smartphones have a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Successful exploitation could lead to remote code execution", "sources": [ { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "VULHUB", "id": "VHN-397932" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36999", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014259", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2099", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-397932", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "id": "VAR-202110-1477", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-397932" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:40.614000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36999", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171635" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36999" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-397932" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "date": "2021-10-28T13:15:10.953000", "db": "NVD", "id": "CVE-2021-36999" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-397932" }, { "date": "2022-10-11T08:35:00", "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "date": "2021-11-01T20:50:20.327000", "db": "NVD", "id": "CVE-2021-36999" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2099" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 smartphone \u00a0 classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014259" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2099" } ], "trust": 0.6 } }
var-201711-0259
Vulnerability from variot
ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path. plural Huawei There is a path traversal vulnerability in smartphone software.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Huawei EMUI is prone to a directory-traversal vulnerability and a command-injection vulnerability because it fails to sufficiently sanitize user-supplied input. Huawei Maimang 4, etc. are all smartphone products of China's Huawei (Huawei). EMUI is a smart terminal human-computer interaction system based on the Android platform used in it. EMUI 3 in various Huawei products. There is a path traversal vulnerability in version 1, which is caused by the fact that the program does not fully verify the path when decompressing a specific type of file
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-cl00c92b172" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-ul00c17b220" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-al00c00b210" }, { "model": "honor 6", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "h60-l04c10b523" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-tl00c01b210" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-al00c00b220" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-tl00c01b220" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-ul00c00b210" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-ul00c00b250." }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-ul00c432b220" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-al00c92b200" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-l01c432b190" }, { "model": "mate 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "mt7-l09c900b339" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c636b200" }, { "model": "mate 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "mt7-l09c605b325" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c432b214" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-l01c636b130" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l02c635b140" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-tl01hc01b220" }, { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-ul20c432b171" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-tl00hc01b210" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-tl00c01b230sp01" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c464b150" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-ul00c10b201" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c185b200" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-al10c00b220" }, { "model": "g8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-cl00c92b220" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-cl00c92b220" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-l01c10b140" }, { "model": "honor 6", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "h60-l04c185b523" }, { "model": "g8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-al00c00b220" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l02c636b140" }, { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-tl00c01b172" }, { "model": "g8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-tl00c01b220" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-al10c92b220" }, { "model": "mate 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "mt7-tl10c900b339" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l21c10b150" }, { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-ul00c00b172" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-l09c432b222" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-tl00c01b250" }, { "model": "shotx", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ath-cl00c92b210" }, { "model": "g8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "rio-ul00c00b220" }, { "model": "honor 6", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "h60-l04c636b527" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-cl00c92b230" }, { "model": "honor 7", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "plk-l01c432b187" }, { "model": "mate s", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "crr-l09c432b180" }, { "model": "p8 lite", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "ale-l23c605b190" }, { "model": "p8", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "gra-ul00c00b230" }, { "model": "honor 6", "scope": "lte", "trust": 1.0, "vendor": "huawei", "version": "h60-l04c900b530" }, { "model": "g8", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "honor 6", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "honor 7", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "mate 7", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "mate s", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "p8 lite", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "p8", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "shotx", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-tl00hc01b210" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-al00c00b220" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-al00c00b210" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-tl00c01b210" }, { "model": "g8", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-tl00c01b220" }, { "model": "g8", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-cl00c92b220" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-cl00c92b210" }, { "model": "g8", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-ul00c00b220" }, { "model": "shotx", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "ath-ul00c00b210" }, { "model": "g8", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "rio-al00c00b220" }, { "model": "shotx ath-ul00c00b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-tl00hc01b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-tl00c01b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-cl00c92b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-al00c92b200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-al00c00b210", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-ul00c00b250", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-tl00c01b250", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l23c605b190", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c636b200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c464b150", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c432b214", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c185b200", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-ul00c00b230", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-tl00c01b230sp01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-cl00c92b230", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-ul00c00b172", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-tl00c01b172", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-cl00c92b172", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "honor plk-ul00c17b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-tl01hc01b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-tl00c01b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c636b130", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c432b190", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c432b187", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c185b130", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c10b140", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-al10c92b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-al10c00b220", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "g8 rio-ul00c00b220", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-tl00c01b220", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-cl00c92b220", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-al00c00b220", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "emui", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "3.1" }, { "model": "shotx ath-ul00c00b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-tl00hc01b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-tl00c01b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-cl00c92b380", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-al00c92b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "shotx ath-al00c00b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-ul00c00b571", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-tl00c01b575", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l23c605b527", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c636b563", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c464b581", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c432b585", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 lite ale-l21c185b562", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-ul00c00b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-tl00c01b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-cl00c92b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-ul00c00b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-tl00c01b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate s crr-cl00c92b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "honor plk-ul00c17b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-tl01hc01b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-tl00c01b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c636b350", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c432b380", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c185b380", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-l01c10b331", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-cl00c92b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-al10c92b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "honor plk-al10c00b382", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "7" }, { "model": "g8 rio-ul00c00b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-tl00c01b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-cl00c92b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "g8 rio-al00c00b390", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null } ], "sources": [ { "db": "BID", "id": "95919" }, { "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "db": "NVD", "id": "CVE-2017-2693" }, { "db": "CNNVD", "id": "CNNVD-201702-249" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l02c635b140", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l02c636b140", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c10b150", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c185b200", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c432b214", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c464b150", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l21c636b200", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-l23c605b190", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-tl00c01b250", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ale-ul00c00b250.", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "mt7-l09c605b325", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "mt7-l09c900b339", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "mt7-tl10c900b339", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-cl00c92b172", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-l09c432b180", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-tl00c01b172", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-ul00c00b172", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "crr-ul20c432b171", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-cl00c92b230", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-l09c432b222", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-tl00c01b230sp01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-ul00c00b230", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-ul00c10b201", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "gra-ul00c432b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "h60-l04c10b523", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "h60-l04c185b523", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "h60-l04c636b527", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "h60-l04c900b530", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-al10c00b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-al10c92b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-cl00c92b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c10b140", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c10b140", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c432b187", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c432b190", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-l01c636b130", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-tl00c01b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-tl01hc01b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "plk-ul00c17b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-al00c92b200", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-cl00c92b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-tl00c01b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-tl00hc01b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-ul00c00b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-al00c00b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "ath-al00c00b210", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-al00c00b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-cl00c92b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-tl00c01b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "rio-ul00c00b220", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-2693" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Flanker from the Keen Security Lab of Tencent.", "sources": [ { "db": "BID", "id": "95919" }, { "db": "CNNVD", "id": "CNNVD-201702-249" } ], "trust": 0.9 }, "cve": "CVE-2017-2693", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2017-2693", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-110896", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-2693", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-2693", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201702-249", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-110896", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-110896" }, { "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "db": "NVD", "id": "CVE-2017-2693" }, { "db": "CNNVD", "id": "CNNVD-201702-249" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path. plural Huawei There is a path traversal vulnerability in smartphone software.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Huawei EMUI is prone to a directory-traversal vulnerability and a command-injection vulnerability because it fails to sufficiently sanitize user-supplied input. Huawei Maimang 4, etc. are all smartphone products of China\u0027s Huawei (Huawei). EMUI is a smart terminal human-computer interaction system based on the Android platform used in it. EMUI 3 in various Huawei products. There is a path traversal vulnerability in version 1, which is caused by the fact that the program does not fully verify the path when decompressing a specific type of file", "sources": [ { "db": "NVD", "id": "CVE-2017-2693" }, { "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "db": "BID", "id": "95919" }, { "db": "VULHUB", "id": "VHN-110896" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2693", "trust": 2.8 }, { "db": "BID", "id": "95919", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2017-010502", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201702-249", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-110896", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110896" }, { "db": "BID", "id": "95919" }, { "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "db": "NVD", "id": "CVE-2017-2693" }, { "db": "CNNVD", "id": "CNNVD-201702-249" } ] }, "id": "VAR-201711-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-110896" } ], "trust": 0.69526687 }, "last_update_date": "2023-12-18T12:29:20.603000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20170125-01-emui", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" }, { "title": "Huawei EMUI Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=67640" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "db": "CNNVD", "id": "CNNVD-201702-249" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110896" }, { "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "db": "NVD", "id": "CVE-2017-2693" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/95919" }, { "trust": 1.7, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2693" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2693" }, { "trust": 0.3, "url": "http://www.huawei.com/en/" }, { "trust": 0.3, "url": "http://www.huawei.com/en/psirt/security-advisories/2017/huawei-sa-20170125-01-emui-en" } ], "sources": [ { "db": "VULHUB", "id": "VHN-110896" }, { "db": "BID", "id": "95919" }, { "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "db": "NVD", "id": "CVE-2017-2693" }, { "db": "CNNVD", "id": "CNNVD-201702-249" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-110896" }, { "db": "BID", "id": "95919" }, { "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "db": "NVD", "id": "CVE-2017-2693" }, { "db": "CNNVD", "id": "CNNVD-201702-249" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-22T00:00:00", "db": "VULHUB", "id": "VHN-110896" }, { "date": "2017-01-25T00:00:00", "db": "BID", "id": "95919" }, { "date": "2017-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "date": "2017-11-22T19:29:00.367000", "db": "NVD", "id": "CVE-2017-2693" }, { "date": "2017-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-249" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-07T00:00:00", "db": "VULHUB", "id": "VHN-110896" }, { "date": "2017-02-02T00:09:00", "db": "BID", "id": "95919" }, { "date": "2017-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010502" }, { "date": "2017-12-07T18:58:08.093000", "db": "NVD", "id": "CVE-2017-2693" }, { "date": "2017-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-249" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-249" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Path traversal vulnerability in smartphone software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010502" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-249" } ], "trust": 0.6 } }
var-202212-0651
Vulnerability from variot
The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0651", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-46317" } ] }, "cve": "CVE-2022-46317", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-46317", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-46317", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2502", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of HarmonyOS and EMUI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "VULHUB", "id": "VHN-444287" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-46317", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-023890", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2502", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-444287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "id": "VAR-202212-0651", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-444287" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:46.580000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218955" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-46317" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-46317/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-444287" }, { "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "db": "NVD", "id": "CVE-2022-46317" }, { "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-444287" }, { "date": "2023-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "date": "2022-12-20T21:15:11.493000", "db": "NVD", "id": "CVE-2022-46317" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-24T00:00:00", "db": "VULHUB", "id": "VHN-444287" }, { "date": "2023-11-30T04:33:00", "db": "JVNDB", "id": "JVNDB-2022-023890" }, { "date": "2022-12-24T04:15:35.443000", "db": "NVD", "id": "CVE-2022-46317" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2502" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2502" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-023890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2502" } ], "trust": 0.6 } }
var-202209-0172
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0172", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38994" } ] }, "cve": "CVE-2022-38994", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38994", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38994", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-178", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "VULHUB", "id": "VHN-428514" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38994", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016785", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-178", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428514", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428514" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "id": "VAR-202209-0172", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428514" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:53.704000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208083" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38994" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38994/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428514" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428514" }, { "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "db": "NVD", "id": "CVE-2022-38994" }, { "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428514" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "date": "2022-09-16T18:15:17.707000", "db": "NVD", "id": "CVE-2022-38994" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428514" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016785" }, { "date": "2022-09-17T03:11:09.253000", "db": "NVD", "id": "CVE-2022-38994" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-178" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-178" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016785" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-178" } ], "trust": 0.6 } }
var-202111-1585
Vulnerability from variot
There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are remote DoS vulnerabilities in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1585", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37031" } ] }, "cve": "CVE-2021-37031", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37031", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398864", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37031", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37031", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1896", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398864", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398864" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are remote DoS vulnerabilities in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "VULHUB", "id": "VHN-398864" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37031", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015557", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1896", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102861", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398864", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398864" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "id": "VAR-202111-1585", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398864" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:21.661000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172193" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37031" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398864" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398864" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398864" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "date": "2021-11-23T16:15:09.750000", "db": "NVD", "id": "CVE-2021-37031" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398864" }, { "date": "2022-11-24T06:40:00", "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "date": "2021-12-09T17:57:49.613000", "db": "NVD", "id": "CVE-2021-37031" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1896" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015557" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1896" } ], "trust": 0.6 } }
var-202203-0261
Vulnerability from variot
There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40053" } ] }, "cve": "CVE-2021-40053", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40053", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401454", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40053", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40053", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202203-983", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401454", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "VULHUB", "id": "VHN-401454" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40053", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018711", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-983", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401454", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "id": "VAR-202203-0261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401454" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:56.714000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Huawei Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208071" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40053" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40053/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401454" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "date": "2022-03-10T17:43:19.430000", "db": "NVD", "id": "CVE-2021-40053" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-401454" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "date": "2022-10-27T18:47:20.967000", "db": "NVD", "id": "CVE-2021-40053" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018711" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ], "trust": 0.6 } }
var-202203-0968
Vulnerability from variot
There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0968", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40049" } ] }, "cve": "CVE-2021-40049", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40049", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401450", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40049", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40049", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-991", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401450", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "VULHUB", "id": "VHN-401450" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40049", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018715", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-991", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401450", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "id": "VAR-202203-0968", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401450" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:01.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Honor Magic Ui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186015" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40049" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40049/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401450" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "date": "2022-03-10T17:43:17.500000", "db": "NVD", "id": "CVE-2021-40049" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401450" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "date": "2022-03-14T15:36:29.610000", "db": "NVD", "id": "CVE-2021-40049" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018715" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ], "trust": 0.6 } }
var-202211-0326
Vulnerability from variot
The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0326", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44562" } ] }, "cve": "CVE-2022-44562", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-44562", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44562", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202211-2133", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "VULHUB", "id": "VHN-441952" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44562", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020501", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2133", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441952", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "id": "VAR-202211-0326", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441952" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:54:41.919000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213973" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44562" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44562/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441952" }, { "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "db": "NVD", "id": "CVE-2022-44562" }, { "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441952" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "date": "2022-11-09T21:15:18.920000", "db": "NVD", "id": "CVE-2022-44562" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441952" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020501" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-44562" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2133" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020501" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2133" } ], "trust": 0.6 } }
var-202106-0612
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the device to crash and restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0612", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22350" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22350" } ] }, "cve": "CVE-2021-22350", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380785", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22350", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22350", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2008", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380785", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22350", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" }, { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the device to crash and restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22350", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2008", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380785", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22350", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" }, { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "id": "VAR-202106-0612", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380785" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:51.178000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156086" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "NVD", "id": "CVE-2021-22350" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22350" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" }, { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" }, { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380785" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22350" }, { "date": "2021-06-30T21:15:09.830000", "db": "NVD", "id": "CVE-2021-22350" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380785" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22350" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22350" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2008" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2008" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2008" } ], "trust": 0.6 } }
var-202202-1526
Vulnerability from variot
There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality. EMUI and Magic UI There is a vulnerability in improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1526", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37103" } ] }, "cve": "CVE-2021-37103", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37103", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-398940", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37103", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37103", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-2068", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398940", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality. EMUI and Magic UI There is a vulnerability in improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "VULHUB", "id": "VHN-398940" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37103", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-007118", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-2068", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398940", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "id": "VAR-202202-1526", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398940" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:02.919000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0October\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184225" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37103" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-37103/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-398940" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "date": "2022-02-25T19:15:11.870000", "db": "NVD", "id": "CVE-2021-37103" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-398940" }, { "date": "2023-07-12T06:34:00", "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "date": "2022-03-08T13:59:22.953000", "db": "NVD", "id": "CVE-2021-37103" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2068" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007118" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2068" } ], "trust": 0.6 } }
var-202203-0973
Vulnerability from variot
There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0973", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40055" } ] }, "cve": "CVE-2021-40055", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 6.9, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40055", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-401456", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40055", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40055", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202203-979", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401456", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "VULHUB", "id": "VHN-401456" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40055", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018709", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-979", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401456", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "id": "VAR-202203-0973", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401456" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:55.882000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185893" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40055" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40055/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401456" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "date": "2022-03-10T17:43:20.810000", "db": "NVD", "id": "CVE-2021-40055" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401456" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "date": "2022-03-14T15:53:08.183000", "db": "NVD", "id": "CVE-2021-40055" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ], "trust": 0.6 } }
var-202106-0595
Vulnerability from variot
There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0595", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22371" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22371" } ] }, "cve": "CVE-2021-22371", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380806", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22371", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22371", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1992", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380806", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22371", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" }, { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22371", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1992", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380806", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22371", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" }, { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "id": "VAR-202106-0595", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380806" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:52.465000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156075" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "NVD", "id": "CVE-2021-22371" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22371" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" }, { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" }, { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380806" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22371" }, { "date": "2021-06-30T15:15:10.413000", "db": "NVD", "id": "CVE-2021-22371" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380806" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22371" }, { "date": "2021-07-06T16:19:21.713000", "db": "NVD", "id": "CVE-2021-22371" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1992" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1992" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1992" } ], "trust": 0.6 } }
var-202108-2205
Vulnerability from variot
There is a Permission Control Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei Smartphones contain vulnerabilities related to fraudulent authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2205", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22389" } ] }, "cve": "CVE-2021-22389", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22389", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380824", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22389", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22389", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-106", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380824", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22389", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission Control Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei Smartphones contain vulnerabilities related to fraudulent authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22389", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010875", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-106", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380824", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22389", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "id": "VAR-202108-2205", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380824" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:18.781000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22389", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159051" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-863", "trust": 1.1 }, { "problemtype": "Illegal authentication (CWE-863) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22389" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380824" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22389" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "date": "2021-08-02T17:15:13.883000", "db": "NVD", "id": "CVE-2021-22389" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380824" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22389" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "date": "2021-12-09T17:55:10.153000", "db": "NVD", "id": "CVE-2021-22389" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-106" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Fraud related to unauthorized authentication on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010875" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-106" } ], "trust": 0.6 } }
var-202210-0253
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0253", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41598" } ] }, "cve": "CVE-2022-41598", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41598", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41598", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-153", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "VULHUB", "id": "VHN-437840" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41598", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018789", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-153", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437840", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "id": "VAR-202210-0253", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437840" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:30.038000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210787" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41598" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41598/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437840" }, { "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "db": "NVD", "id": "CVE-2022-41598" }, { "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437840" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "date": "2022-10-14T16:15:28.530000", "db": "NVD", "id": "CVE-2022-41598" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437840" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018789" }, { "date": "2022-10-15T01:56:09.340000", "db": "NVD", "id": "CVE-2022-41598" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-153" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-153" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018789" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-153" } ], "trust": 0.6 } }
var-202208-0704
Vulnerability from variot
The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0704", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40034" } ] }, "cve": "CVE-2021-40034", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40034", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40034", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2403", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "VULHUB", "id": "VHN-401435" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40034", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020147", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2403", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401435", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "id": "VAR-202208-0704", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401435" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:55.625000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204204" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40034" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40034/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401435" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "date": "2022-08-10T20:15:22.397000", "db": "NVD", "id": "CVE-2021-40034" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-401435" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "date": "2022-08-12T21:16:26.733000", "db": "NVD", "id": "CVE-2021-40034" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ], "trust": 0.6 } }
var-202301-0511
Vulnerability from variot
The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-0511", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46867" } ] }, "cve": "CVE-2021-46867", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46867", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46867", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202301-440", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access. EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46867", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-001772", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-440", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-449872", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46867", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "id": "VAR-202301-0511", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-449872" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:16:58.155000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202301-0000001435541166 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "title": "HUAWEI EMUI/Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=221317" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46867" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46867/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202301-0000001435541166" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-449872" }, { "db": "VULMON", "id": "CVE-2021-46867" }, { "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "db": "NVD", "id": "CVE-2021-46867" }, { "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-06T00:00:00", "db": "VULHUB", "id": "VHN-449872" }, { "date": "2023-01-06T00:00:00", "db": "VULMON", "id": "CVE-2021-46867" }, { "date": "2023-05-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "date": "2023-01-06T20:15:09.573000", "db": "NVD", "id": "CVE-2021-46867" }, { "date": "2023-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-12T00:00:00", "db": "VULHUB", "id": "VHN-449872" }, { "date": "2023-01-08T00:00:00", "db": "VULMON", "id": "CVE-2021-46867" }, { "date": "2023-05-09T02:02:00", "db": "JVNDB", "id": "JVNDB-2023-001772" }, { "date": "2023-01-12T14:14:56.150000", "db": "NVD", "id": "CVE-2021-46867" }, { "date": "2023-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-440" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-440" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001772" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-440" } ], "trust": 0.6 } }
var-202208-0811
Vulnerability from variot
The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0811", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37003" } ] }, "cve": "CVE-2022-37003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37003", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37003", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202208-2397", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37003", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014553", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2397", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427496", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37003", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "id": "VAR-202208-0811", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427496" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:34.474000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204367" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37003" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37003/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427496" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37003" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "date": "2022-08-10T20:16:04.073000", "db": "NVD", "id": "CVE-2022-37003" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427496" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37003" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "date": "2022-08-15T18:02:06.477000", "db": "NVD", "id": "CVE-2022-37003" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ], "trust": 0.6 } }
var-202106-0602
Vulnerability from variot
There is a Cleartext Transmission of Sensitive Information Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality and availability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0602", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22380" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22380" } ] }, "cve": "CVE-2021-22380", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380815", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22380", "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22380", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-1987", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380815", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22380", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380815" }, { "db": "VULMON", "id": "CVE-2021-22380" }, { "db": "NVD", "id": "CVE-2021-22380" }, { "db": "CNNVD", "id": "CNNVD-202106-1987" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Cleartext Transmission of Sensitive Information Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality and availability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22380" }, { "db": "VULHUB", "id": "VHN-380815" }, { "db": "VULMON", "id": "CVE-2021-22380" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22380", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1987", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380815", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22380", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380815" }, { "db": "VULMON", "id": "CVE-2021-22380" }, { "db": "NVD", "id": "CVE-2021-22380" }, { "db": "CNNVD", "id": "CNNVD-202106-1987" } ] }, "id": "VAR-202106-0602", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380815" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:27.232000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156070" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1987" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-319", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380815" }, { "db": "NVD", "id": "CVE-2021-22380" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/319.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380815" }, { "db": "VULMON", "id": "CVE-2021-22380" }, { "db": "NVD", "id": "CVE-2021-22380" }, { "db": "CNNVD", "id": "CNNVD-202106-1987" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380815" }, { "db": "VULMON", "id": "CVE-2021-22380" }, { "db": "NVD", "id": "CVE-2021-22380" }, { "db": "CNNVD", "id": "CNNVD-202106-1987" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380815" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22380" }, { "date": "2021-06-30T14:15:08.723000", "db": "NVD", "id": "CVE-2021-22380" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1987" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380815" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22380" }, { "date": "2021-07-06T15:00:12.220000", "db": "NVD", "id": "CVE-2021-22380" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1987" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1987" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1987" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1987" } ], "trust": 0.6 } }
var-202212-0559
Vulnerability from variot
The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0559", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41591" } ] }, "cve": "CVE-2022-41591", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-41591", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41591", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-2486", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files. EMUI and HarmonyOS Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "VULHUB", "id": "VHN-437827" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41591", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-003427", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202212-2486", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437827", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "id": "VAR-202212-0559", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437827" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:22.200000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202212-0000001462975397 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=219371" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41591" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41591/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202212-0000001462975397" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437827" }, { "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "db": "NVD", "id": "CVE-2022-41591" }, { "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-20T00:00:00", "db": "VULHUB", "id": "VHN-437827" }, { "date": "2023-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "date": "2022-12-20T21:15:10.857000", "db": "NVD", "id": "CVE-2022-41591" }, { "date": "2022-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-29T00:00:00", "db": "VULHUB", "id": "VHN-437827" }, { "date": "2023-02-17T01:48:00", "db": "JVNDB", "id": "JVNDB-2022-003427" }, { "date": "2022-12-29T18:52:39.017000", "db": "NVD", "id": "CVE-2022-41591" }, { "date": "2022-12-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-2486" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2486" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003427" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-2486" } ], "trust": 0.6 } }
var-202211-0370
Vulnerability from variot
The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0370", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-44549" } ] }, "cve": "CVE-2022-44549", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-44549", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-44549", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2130", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality. Huawei of HarmonyOS and EMUI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "VULHUB", "id": "VHN-441930" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-44549", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020504", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2130", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-441930", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "id": "VAR-202211-0370", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-441930" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:28.168000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213971" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-44549" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-44549/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-441930" }, { "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "db": "NVD", "id": "CVE-2022-44549" }, { "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-441930" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "date": "2022-11-09T21:15:18.160000", "db": "NVD", "id": "CVE-2022-44549" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-441930" }, { "date": "2023-11-02T08:02:00", "db": "JVNDB", "id": "JVNDB-2022-020504" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-44549" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0HarmonyOS\u00a0 and \u00a0EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020504" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2130" } ], "trust": 0.6 } }
var-202206-0025
Vulnerability from variot
The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in a format string vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0025", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31753" } ] }, "cve": "CVE-2022-31753", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31753", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423586", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31753", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31753", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-469", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423586", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31753", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in a format string vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31753", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012035", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-469", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66173", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423586", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31753", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "id": "VAR-202206-0025", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423586" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:59.362000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for formatting string error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=197630" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-134", "trust": 1.0 }, { "problemtype": "Format string problem (CWE-134) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31753" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31753/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/134.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423586" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31753" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "date": "2022-06-13T16:15:08.620000", "db": "NVD", "id": "CVE-2022-31753" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423586" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2022-31753" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "date": "2022-06-27T16:13:45.880000", "db": "NVD", "id": "CVE-2022-31753" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Format String Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "format string error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ], "trust": 0.6 } }
var-202208-0666
Vulnerability from variot
The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0666", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37002" } ] }, "cve": "CVE-2022-37002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37002", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202208-2399", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014554", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2399", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427494", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "id": "VAR-202208-0666", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427494" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:58.071000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204369" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37002" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37002/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427494" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37002" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "date": "2022-08-10T20:16:03.777000", "db": "NVD", "id": "CVE-2022-37002" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427494" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37002" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-37002" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ], "trust": 0.6 } }
var-202205-0481
Vulnerability from variot
The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0481", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29796" } ] }, "cve": "CVE-2022-29796", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29796", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421305", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29796", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29796", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2548", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421305", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29796", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009625", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2548", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53574", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421305", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29796", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "id": "VAR-202205-0481", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421305" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:58.880000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193769" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29796" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29796/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421305" }, { "db": "VULMON", "id": "CVE-2022-29796" }, { "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "db": "NVD", "id": "CVE-2022-29796" }, { "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421305" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29796" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "date": "2022-05-13T15:15:10.080000", "db": "NVD", "id": "CVE-2022-29796" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-421305" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29796" }, { "date": "2023-08-07T08:13:00", "db": "JVNDB", "id": "JVNDB-2022-009625" }, { "date": "2022-05-23T18:39:16.137000", "db": "NVD", "id": "CVE-2022-29796" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2548" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2548" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009625" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2548" } ], "trust": 0.6 } }
var-202302-0414
Vulnerability from variot
The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0414", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48294" } ] }, "cve": "CVE-2022-48294", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48294", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48294", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-353", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is an authentication vulnerability in.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48294", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003620", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-353", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453374", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48294", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "id": "VAR-202302-0414", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453374" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:16:55.673000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225930" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48294" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48294/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453374" }, { "db": "VULMON", "id": "CVE-2022-48294" }, { "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "db": "NVD", "id": "CVE-2022-48294" }, { "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453374" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48294" }, { "date": "2023-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "date": "2023-02-09T17:15:13.837000", "db": "NVD", "id": "CVE-2022-48294" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-17T00:00:00", "db": "VULHUB", "id": "VHN-453374" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48294" }, { "date": "2023-09-14T07:47:00", "db": "JVNDB", "id": "JVNDB-2023-003620" }, { "date": "2023-02-17T14:17:12.003000", "db": "NVD", "id": "CVE-2022-48294" }, { "date": "2023-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-353" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-353" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Authentication vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003620" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-353" } ], "trust": 0.6 } }
var-202206-0377
Vulnerability from variot
The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI , HarmonyOS , Magic UI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0377", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31762" } ] }, "cve": "CVE-2022-31762", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31762", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423595", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31762", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31762", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-473", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423595", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31762", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI , HarmonyOS , Magic UI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31762", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011277", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-473", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66177", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423595", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "id": "VAR-202206-0377", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423595" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:47.147000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196700" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31762 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31762" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31762/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31762" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423595" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31762" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "date": "2022-06-13T15:15:10.423000", "db": "NVD", "id": "CVE-2022-31762" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423595" }, { "date": "2022-10-05T00:00:00", "db": "VULMON", "id": "CVE-2022-31762" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "date": "2022-10-05T14:59:08.577000", "db": "NVD", "id": "CVE-2022-31762" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-473" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product input verification vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011277" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-473" } ], "trust": 0.6 } }
var-202201-1021
Vulnerability from variot
There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HarmonyOS Wearables is an electronic watch operating system from Huawei, a Chinese company. An attacker can use this vulnerability to cause system exceptions. There is a security vulnerability in Huawei HarmonyOS Wearables
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1021", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos wearables", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40009" } ] }, "cve": "CVE-2021-40009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40009", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-08049", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401410", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40009", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40009", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-08049", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-314", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401410", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HarmonyOS Wearables is an electronic watch operating system from Huawei, a Chinese company. An attacker can use this vulnerability to cause system exceptions. There is a security vulnerability in Huawei HarmonyOS Wearables", "sources": [ { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40009", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002891", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-08049", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-314", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401410", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "id": "VAR-202201-1021", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" } ] }, "last_update_date": "2023-12-18T14:04:05.148000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Patch for Huawei HarmonyOS Wearables Out-of-bounds Write Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/316801" }, { "title": "Huawei HarmonyOS Wearables Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178011" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40009" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-30T00:00:00", "db": "CNVD", "id": "CNVD-2022-08049" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401410" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "date": "2022-01-10T14:10:21.310000", "db": "NVD", "id": "CVE-2021-40009" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2022-08049" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401410" }, { "date": "2023-01-24T05:28:00", "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "date": "2022-01-13T15:32:45.070000", "db": "NVD", "id": "CVE-2021-40009" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-314" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-314" } ], "trust": 0.6 } }
var-202209-0366
Vulnerability from variot
The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0366", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38999" } ] }, "cve": "CVE-2022-38999", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38999", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38999", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-170", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. Huawei of EMUI and HarmonyOS Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38999", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017155", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-170", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434770", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-38999", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "id": "VAR-202209-0366", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434770" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:55.156000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208080" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38999" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38999/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434770" }, { "db": "VULMON", "id": "CVE-2022-38999" }, { "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "db": "NVD", "id": "CVE-2022-38999" }, { "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434770" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-38999" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "date": "2022-09-16T18:15:17.860000", "db": "NVD", "id": "CVE-2022-38999" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-434770" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-38999" }, { "date": "2023-10-11T08:51:00", "db": "JVNDB", "id": "JVNDB-2022-017155" }, { "date": "2022-09-20T18:58:51.147000", "db": "NVD", "id": "CVE-2022-38999" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-170" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-170" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017155" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-170" } ], "trust": 0.6 } }
var-202109-1959
Vulnerability from variot
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows. EMUI , HarmonyOS , Magic UI Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1959", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22319" } ] }, "cve": "CVE-2021-22319", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22319", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380754", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22319", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22319", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2053", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380754", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows. EMUI , HarmonyOS , Magic UI Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "VULHUB", "id": "VHN-380754" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22319", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2053", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380754", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "id": "VAR-202109-1959", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380754" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:43.444000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202109-0000001150310956 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171906" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22319" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22319/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380754" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "date": "2022-02-25T19:15:08.823000", "db": "NVD", "id": "CVE-2021-22319" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380754" }, { "date": "2023-06-30T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "date": "2022-03-07T17:35:13.593000", "db": "NVD", "id": "CVE-2021-22319" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2053" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Integer overflow vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2053" } ], "trust": 0.6 } }
var-202112-0335
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0335", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37020" } ] }, "cve": "CVE-2021-37020", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37020", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398853", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37020", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37020", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2060", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398853", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "VULHUB", "id": "VHN-398853" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37020", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015760", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2060", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398853", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "id": "VAR-202112-0335", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398853" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:33.104000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173236" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37020" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398853" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "date": "2021-12-07T17:15:08.303000", "db": "NVD", "id": "CVE-2021-37020" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398853" }, { "date": "2022-11-30T01:43:00", "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37020" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2060" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2060" } ], "trust": 0.6 } }
var-202110-1482
Vulnerability from variot
There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist. Huawei Smartphones contain a race condition vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1482", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36994" } ] }, "cve": "CVE-2021-36994", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36994", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398827", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.7, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36994", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36994", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202110-2093", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-398827", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist. Huawei Smartphones contain a race condition vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "VULHUB", "id": "VHN-398827" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36994", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014264", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2093", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398827", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "id": "VAR-202110-1482", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398827" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:18.822000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36994", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168230" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36994" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398827" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "date": "2021-10-28T13:15:10.740000", "db": "NVD", "id": "CVE-2021-36994" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398827" }, { "date": "2022-10-11T08:52:00", "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "date": "2021-11-01T23:07:39.173000", "db": "NVD", "id": "CVE-2021-36994" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2093" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014264" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2093" } ], "trust": 0.6 } }
var-202206-0259
Vulnerability from variot
The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46814" } ] }, "cve": "CVE-2021-46814", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46814", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423547", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46814", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46814", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-481", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423547", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46814", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46814", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011372", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-481", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51604", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423547", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46814", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "id": "VAR-202206-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423547" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:04.965000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46814" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46814/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423547" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46814" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "date": "2022-06-13T15:15:09.893000", "db": "NVD", "id": "CVE-2021-46814" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423547" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46814" }, { "date": "2023-08-21T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-46814" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-481" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011372" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-481" } ], "trust": 0.6 } }
var-202210-0320
Vulnerability from variot
The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0320", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41601" } ] }, "cve": "CVE-2022-41601", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 0.8, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 3.4, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-41601", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41601", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202210-151", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service", "sources": [ { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "VULHUB", "id": "VHN-437848" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41601", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-018787", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-151", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437848", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "id": "VAR-202210-0320", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437848" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:50:53.104000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210785" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41601" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41601/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437848" }, { "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "db": "NVD", "id": "CVE-2022-41601" }, { "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437848" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "date": "2022-10-14T16:15:29.460000", "db": "NVD", "id": "CVE-2022-41601" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-15T00:00:00", "db": "VULHUB", "id": "VHN-437848" }, { "date": "2023-10-23T08:11:00", "db": "JVNDB", "id": "JVNDB-2022-018787" }, { "date": "2022-10-15T01:57:37.013000", "db": "NVD", "id": "CVE-2022-41601" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-151" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-151" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018787" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-151" } ], "trust": 0.6 } }
var-202201-1022
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1022", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40026" } ] }, "cve": "CVE-2021-40026", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40026", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401427", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40026", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40026", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-312", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401427", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations", "sources": [ { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "VULHUB", "id": "VHN-401427" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40026", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002899", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-312", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401427", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "id": "VAR-202201-1022", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401427" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:53.181000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Wearables Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178009" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40026" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401427" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "date": "2022-01-10T14:10:21.760000", "db": "NVD", "id": "CVE-2021-40026" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401427" }, { "date": "2023-01-25T08:35:00", "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "date": "2022-01-13T14:26:51.273000", "db": "NVD", "id": "CVE-2021-40026" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-312" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-312" } ], "trust": 0.6 } }
var-202207-0182
Vulnerability from variot
The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0182", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34739" } ] }, "cve": "CVE-2022-34739", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-34739", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427091", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34739", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34739", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-393", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427091", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34739", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34739", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013201", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-393", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52824", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427091", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34739", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "id": "VAR-202207-0182", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427091" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:17.295000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199744" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34739" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34739/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427091" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34739" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "date": "2022-07-12T14:15:19.417000", "db": "NVD", "id": "CVE-2022-34739" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427091" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34739" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "date": "2022-07-19T12:47:45.723000", "db": "NVD", "id": "CVE-2022-34739" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ], "trust": 0.6 } }
var-202110-1416
Vulnerability from variot
There is a Logic Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphones have unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1416", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22436" } ] }, "cve": "CVE-2021-22436", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22436", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380871", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22436", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22436", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2039", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380871", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22436", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Logic Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphones have unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22436", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014461", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2039", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380871", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22436", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "id": "VAR-202110-1416", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380871" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.573000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171449" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22436" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380871" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22436" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "date": "2021-10-28T13:15:08.773000", "db": "NVD", "id": "CVE-2021-22436" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380871" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22436" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "date": "2021-11-02T14:31:18.487000", "db": "NVD", "id": "CVE-2021-22436" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2039" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014461" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2039" } ], "trust": 0.6 } }
var-202101-1002
Vulnerability from variot
There is a heap base buffer overflow vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability can cause heap overflow and memory overwriting when the system incorrectly processes the update file. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is tampered with and denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. Various Huawei and Honor mobile device operating systems have buffer error vulnerabilities. The following products and models are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1002", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9142" } ] }, "cve": "CVE-2020-9142", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9142", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-187267", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9142", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9142", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1098", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187267", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap base buffer overflow vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability can cause heap overflow and memory overwriting when the system incorrectly processes the update file. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is tampered with and denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. Various Huawei and Honor mobile device operating systems have buffer error vulnerabilities. The following products and models are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1", "sources": [ { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "VULHUB", "id": "VHN-187267" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9142", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015408", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1098", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-187267", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "id": "VAR-202101-1002", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187267" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:44.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Huawei Emui and Honor Magic Ui Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139458" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9142" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187267" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "date": "2021-01-13T22:15:14.130000", "db": "NVD", "id": "CVE-2020-9142" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-187267" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "date": "2021-01-19T14:45:28.930000", "db": "NVD", "id": "CVE-2020-9142" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1098" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding out-of-bounds writing on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015408" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1098" } ], "trust": 0.6 } }
var-202201-1055
Vulnerability from variot
The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution. Huawei EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1055", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40010" } ] }, "cve": "CVE-2021-40010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40010", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401411", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40010", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40010", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202201-276", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401411", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution. Huawei EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "VULHUB", "id": "VHN-401411" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40010", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002887", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-276", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401411", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "id": "VAR-202201-1055", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401411" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:25.024000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202201-0000001194056366 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177995" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40010" }, { "trust": 0.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401411" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "date": "2022-01-10T14:10:21.360000", "db": "NVD", "id": "CVE-2021-40010" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-30T00:00:00", "db": "VULHUB", "id": "VHN-401411" }, { "date": "2023-01-24T03:05:00", "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "date": "2022-09-30T13:21:19.767000", "db": "NVD", "id": "CVE-2021-40010" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-276" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-276" } ], "trust": 0.6 } }
var-202111-1767
Vulnerability from variot
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37133" } ] }, "cve": "CVE-2021-37133", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37133", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398969", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37133", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37133", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2133", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398969", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37133", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2133", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398969", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37133", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "id": "VAR-202111-1767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398969" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.599000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176794" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37133" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398969" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37133" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "date": "2022-01-03T22:15:09.800000", "db": "NVD", "id": "CVE-2021-37133" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398969" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37133" }, { "date": "2023-01-27T05:09:00", "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-37133" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2133" } ], "trust": 0.6 } }
var-202209-0391
Vulnerability from variot
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0391", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39005" } ] }, "cve": "CVE-2022-39005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39005", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-194", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39005", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-194", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428499", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39005", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "id": "VAR-202209-0391", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428499" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:44.885000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208090" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39005" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39005/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428499" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39005" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "date": "2022-09-16T18:15:18.090000", "db": "NVD", "id": "CVE-2022-39005" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428499" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39005" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "date": "2022-09-21T12:47:59.630000", "db": "NVD", "id": "CVE-2022-39005" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ], "trust": 0.6 } }
var-202210-0413
Vulnerability from variot
The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0413", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46840" } ] }, "cve": "CVE-2021-46840", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46840", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46840", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202210-168", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access. Huawei of EMUI and HarmonyOS Exists in an out-of-bounds read vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "VULHUB", "id": "VHN-430151" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46840", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-019227", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202210-168", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430151", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "id": "VAR-202210-0413", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430151" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:32.149000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211150" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46840" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46840/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430151" }, { "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "db": "NVD", "id": "CVE-2021-46840" }, { "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-430151" }, { "date": "2023-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "date": "2022-10-14T16:15:12.303000", "db": "NVD", "id": "CVE-2021-46840" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-430151" }, { "date": "2023-10-24T08:20:00", "db": "JVNDB", "id": "JVNDB-2022-019227" }, { "date": "2022-10-18T18:39:27.537000", "db": "NVD", "id": "CVE-2021-46840" }, { "date": "2022-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-168" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-168" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-019227" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-168" } ], "trust": 0.6 } }
var-202108-2216
Vulnerability from variot
There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses. Huawei Smartphones contain vulnerabilities related to buffer size calculation errors.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2216", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22392" } ] }, "cve": "CVE-2021-22392", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22392", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380827", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22392", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22392", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-110", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380827", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22392", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses. Huawei Smartphones contain vulnerabilities related to buffer size calculation errors.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22392", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010871", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-110", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380827", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22392", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "id": "VAR-202108-2216", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380827" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:10.263000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22392", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159052" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Buffer size calculation error (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22392" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380827" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22392" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "date": "2021-08-02T17:15:14.033000", "db": "NVD", "id": "CVE-2021-22392" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380827" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22392" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "date": "2021-12-09T17:55:11.027000", "db": "NVD", "id": "CVE-2021-22392" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-110" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding buffer size calculation error in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010871" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-110" } ], "trust": 0.6 } }
var-202211-0383
Vulnerability from variot
The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0383", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46852" } ] }, "cve": "CVE-2021-46852", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46852", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46852", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-2136", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "VULHUB", "id": "VHN-430160" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46852", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-020634", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202211-2136", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430160", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "id": "VAR-202211-0383", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430160" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:21.439000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213974" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46852" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46852/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202211-0000001440896653" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430160" }, { "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "db": "NVD", "id": "CVE-2021-46852" }, { "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-09T00:00:00", "db": "VULHUB", "id": "VHN-430160" }, { "date": "2023-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "date": "2022-11-09T21:15:13.230000", "db": "NVD", "id": "CVE-2021-46852" }, { "date": "2022-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-10T00:00:00", "db": "VULHUB", "id": "VHN-430160" }, { "date": "2023-11-02T08:06:00", "db": "JVNDB", "id": "JVNDB-2022-020634" }, { "date": "2022-11-10T19:32:16.360000", "db": "NVD", "id": "CVE-2021-46852" }, { "date": "2022-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-2136" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2136" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-020634" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-2136" } ], "trust": 0.6 } }
var-202204-0964
Vulnerability from variot
The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0964", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40065" } ] }, "cve": "CVE-2021-40065", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40065", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401466", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40065", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40065", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2027", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401466", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40065", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40065", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-019278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2027", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53579", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401466", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40065", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "id": "VAR-202204-0964", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401466" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:06.468000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189574" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40065" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40065/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-401466" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-40065" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "date": "2022-04-11T20:15:15.987000", "db": "NVD", "id": "CVE-2021-40065" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-15T00:00:00", "db": "VULHUB", "id": "VHN-401466" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40065" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "date": "2022-04-15T19:35:37.037000", "db": "NVD", "id": "CVE-2021-40065" }, { "date": "2022-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ], "trust": 0.6 } }
var-202206-0262
Vulnerability from variot
AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0262", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31759" } ] }, "cve": "CVE-2022-31759", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31759", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423592", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31759", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31759", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-474", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423592", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31759", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011279", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-474", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66178", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423592", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31759", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "id": "VAR-202206-0262", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423592" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:53.936000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196701" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-824", "trust": 1.1 }, { "problemtype": "Accessing uninitialized pointers (CWE-824) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31759" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31759/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423592" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31759" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "date": "2022-06-13T15:15:10.337000", "db": "NVD", "id": "CVE-2022-31759" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423592" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31759" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "date": "2022-06-18T03:09:08.127000", "db": "NVD", "id": "CVE-2022-31759" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Uninitialized Pointer Access Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011279" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ], "trust": 0.6 } }
var-202205-0387
Vulnerability from variot
The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0387", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22260" } ] }, "cve": "CVE-2022-22260", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22260", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409789", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22260", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22260", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202205-2551", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-409789", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22260", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability. Huawei of EMUI and HarmonyOS Exists in a vulnerability related to the use of freed memory.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22260", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009672", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2551", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-409789", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22260", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "id": "VAR-202205-0387", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409789" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:55:47.710000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193772" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22260" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22260/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409789" }, { "db": "VULMON", "id": "CVE-2022-22260" }, { "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "db": "NVD", "id": "CVE-2022-22260" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409789" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22260" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "date": "2022-05-13T15:15:08.793000", "db": "NVD", "id": "CVE-2022-22260" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-409789" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2022-22260" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009672" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2551" }, { "date": "2022-05-23T18:44:20.450000", "db": "NVD", "id": "CVE-2022-22260" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2551" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009672" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2551" } ], "trust": 0.6 } }
var-202302-0315
Vulnerability from variot
The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202302-0315", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-48299" } ] }, "cve": "CVE-2022-48299", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-48299", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-48299", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202302-344", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality. EMUI and HarmonyOS There is a vulnerability in the lack of authentication for critical features.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-48299", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2023-003404", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202302-344", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-453379", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-48299", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "id": "VAR-202302-0315", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-453379" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:41.269000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202302-0000001454769474 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=225745" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-48299" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202302-0000001454769474" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-48299/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-453379" }, { "db": "VULMON", "id": "CVE-2022-48299" }, { "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "db": "NVD", "id": "CVE-2022-48299" }, { "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-09T00:00:00", "db": "VULHUB", "id": "VHN-453379" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48299" }, { "date": "2023-09-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "date": "2023-02-09T17:15:14.853000", "db": "NVD", "id": "CVE-2022-48299" }, { "date": "2023-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-16T00:00:00", "db": "VULHUB", "id": "VHN-453379" }, { "date": "2023-02-09T00:00:00", "db": "VULMON", "id": "CVE-2022-48299" }, { "date": "2023-09-07T03:10:00", "db": "JVNDB", "id": "JVNDB-2023-003404" }, { "date": "2023-02-16T19:32:59.147000", "db": "NVD", "id": "CVE-2022-48299" }, { "date": "2023-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202302-344" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-344" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0HarmonyOS\u00a0 Vulnerability regarding lack of authentication for critical features in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-003404" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202302-344" } ], "trust": 0.6 } }
var-202202-1311
Vulnerability from variot
There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality. EMUI Exists in unspecified vulnerabilities.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1311", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39986" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39986" } ] }, "cve": "CVE-2021-39986", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39986", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-401387", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39986", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39986", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-856", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401387", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401387" }, { "db": "JVNDB", "id": "JVNDB-2022-005122" }, { "db": "NVD", "id": "CVE-2021-39986" }, { "db": "CNNVD", "id": "CNNVD-202202-856" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality. EMUI Exists in unspecified vulnerabilities.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-39986" }, { "db": "JVNDB", "id": "JVNDB-2022-005122" }, { "db": "VULHUB", "id": "VHN-401387" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39986", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005122", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-856", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-12802", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401387", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401387" }, { "db": "JVNDB", "id": "JVNDB-2022-005122" }, { "db": "NVD", "id": "CVE-2021-39986" }, { "db": "CNNVD", "id": "CNNVD-202202-856" } ] }, "id": "VAR-202202-1311", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401387" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:34.139000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184118" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005122" }, { "db": "CNNVD", "id": "CNNVD-202202-856" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005122" }, { "db": "NVD", "id": "CVE-2021-39986" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39986" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401387" }, { "db": "JVNDB", "id": "JVNDB-2022-005122" }, { "db": "NVD", "id": "CVE-2021-39986" }, { "db": "CNNVD", "id": "CNNVD-202202-856" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401387" }, { "db": "JVNDB", "id": "JVNDB-2022-005122" }, { "db": "NVD", "id": "CVE-2021-39986" }, { "db": "CNNVD", "id": "CNNVD-202202-856" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401387" }, { "date": "2023-05-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005122" }, { "date": "2022-02-09T23:15:16.087000", "db": "NVD", "id": "CVE-2021-39986" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-856" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401387" }, { "date": "2023-05-18T07:52:00", "db": "JVNDB", "id": "JVNDB-2022-005122" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-39986" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-856" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-856" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005122" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-856" } ], "trust": 0.6 } }
var-202108-2197
Vulnerability from variot
A component of the Huawei smartphone has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevation of Privileges. plural Huawei Smartphone products contain vulnerabilities related to double release.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2197", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22386" } ] }, "cve": "CVE-2021-22386", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.9, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22386", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-380821", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22386", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22386", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-979", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380821", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22386", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the Huawei smartphone has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevation of Privileges. plural Huawei Smartphone products contain vulnerabilities related to double release.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22386", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009784", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-979", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380821", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22386", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "id": "VAR-202108-2197", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380821" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:48.816000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22386", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159371" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22386" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-380821" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22386" }, { "date": "2022-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "date": "2021-08-10T14:15:07.213000", "db": "NVD", "id": "CVE-2021-22386" }, { "date": "2021-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380821" }, { "date": "2021-08-17T00:00:00", "db": "VULMON", "id": "CVE-2021-22386" }, { "date": "2022-05-23T08:41:00", "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "date": "2021-12-09T17:55:10.250000", "db": "NVD", "id": "CVE-2021-22386" }, { "date": "2022-03-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-979" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Double release vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009784" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-979" } ], "trust": 0.6 } }
var-202204-1426
Vulnerability from variot
The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS DFX module has a reuse-after-free vulnerability. This vulnerability stems from the confusion of the instructions responsible for releasing memory in the DFX module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1426", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22252" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22252" } ] }, "cve": "CVE-2022-22252", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409781", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22252", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22252", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2031", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409781", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-22252", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS DFX module has a reuse-after-free vulnerability. This vulnerability stems from the confusion of the instructions responsible for releasing memory in the DFX module", "sources": [ { "db": "NVD", "id": "CVE-2022-22252" }, { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22252", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2031", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44624", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409781", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22252", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "id": "VAR-202204-1426", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409781" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:54:54.489000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=194227" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22252/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409781" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22252" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "date": "2022-05-13T16:15:08.233000", "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-26T00:00:00", "db": "VULHUB", "id": "VHN-409781" }, { "date": "2022-05-26T00:00:00", "db": "VULMON", "id": "CVE-2022-22252" }, { "date": "2022-05-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "date": "2022-05-26T15:19:28.540000", "db": "NVD", "id": "CVE-2022-22252" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 } }
var-202106-1920
Vulnerability from variot
There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1920", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22317" } ] }, "cve": "CVE-2021-22317", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22317", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380752", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22317", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22317", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-233", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380752", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22317", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22317", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-007565", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-233", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380752", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22317", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "id": "VAR-202106-1920", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380752" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:51.607000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "title": "Repair measures for Huawei\u0027s smartphone information leakage vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153895" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22317" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380752" }, { "date": "2021-06-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22317" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "date": "2021-06-03T16:15:11.380000", "db": "NVD", "id": "CVE-2021-22317" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380752" }, { "date": "2021-06-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22317" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "date": "2021-12-09T17:57:49.430000", "db": "NVD", "id": "CVE-2021-22317" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-233" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007565" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-233" } ], "trust": 0.6 } }
var-202201-1024
Vulnerability from variot
There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS Camera component has a buffer error vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40031" } ] }, "cve": "CVE-2021-40031", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40031", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401432", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40031", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40031", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-297", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401432", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS Camera component has a buffer error vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "VULHUB", "id": "VHN-401432" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40031", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002896", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-297", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401432", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "id": "VAR-202201-1024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401432" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:48.100000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178003" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40031" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401432" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "date": "2022-01-10T14:10:21.987000", "db": "NVD", "id": "CVE-2021-40031" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401432" }, { "date": "2023-01-25T07:51:00", "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "date": "2022-01-13T14:37:17.600000", "db": "NVD", "id": "CVE-2021-40031" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-297" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002896" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-297" } ], "trust": 0.6 } }
var-202210-0249
Vulnerability from variot
The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0249", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41584" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41584" } ] }, "cve": "CVE-2022-41584", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41584", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-181", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting", "sources": [ { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "VULHUB", "id": "VHN-437815" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41584", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-181", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437815", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "id": "VAR-202210-0249", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437815" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:32.284000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211158" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "NVD", "id": "CVE-2022-41584" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41584/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437815" }, { "db": "NVD", "id": "CVE-2022-41584" }, { "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437815" }, { "date": "2022-10-14T16:15:23.267000", "db": "NVD", "id": "CVE-2022-41584" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437815" }, { "date": "2022-10-18T17:23:17.187000", "db": "NVD", "id": "CVE-2022-41584" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-181" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-181" } ], "trust": 0.6 } }
var-202202-1312
Vulnerability from variot
There is a security protection bypass vulnerability with the modem.Successful exploitation of this vulnerability may cause memory protection failure. EMUI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1312", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "db": "NVD", "id": "CVE-2021-37109" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37109" } ] }, "cve": "CVE-2021-37109", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37109", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-398944", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37109", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37109", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202202-854", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398944", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398944" }, { "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "db": "NVD", "id": "CVE-2021-37109" }, { "db": "CNNVD", "id": "CNNVD-202202-854" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a security protection bypass vulnerability with the modem.Successful exploitation of this vulnerability may cause memory protection failure. EMUI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-37109" }, { "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "db": "VULHUB", "id": "VHN-398944" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37109", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005124", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-854", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-12801", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398944", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398944" }, { "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "db": "NVD", "id": "CVE-2021-37109" }, { "db": "CNNVD", "id": "CNNVD-202202-854" } ] }, "id": "VAR-202202-1312", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398944" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:14.298000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184116" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "db": "CNNVD", "id": "CNNVD-202202-854" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "db": "NVD", "id": "CVE-2021-37109" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37109" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398944" }, { "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "db": "NVD", "id": "CVE-2021-37109" }, { "db": "CNNVD", "id": "CNNVD-202202-854" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398944" }, { "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "db": "NVD", "id": "CVE-2021-37109" }, { "db": "CNNVD", "id": "CNNVD-202202-854" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-398944" }, { "date": "2023-05-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "date": "2022-02-09T23:15:15.943000", "db": "NVD", "id": "CVE-2021-37109" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-854" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398944" }, { "date": "2023-05-18T07:52:00", "db": "JVNDB", "id": "JVNDB-2022-005124" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37109" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-854" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-854" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005124" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-854" } ], "trust": 0.6 } }
var-202108-2213
Vulnerability from variot
There is an Improper Validation of Integrity Check Value Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2213", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22442" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22442" } ] }, "cve": "CVE-2021-22442", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380877", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22442", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22442", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-123", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380877", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22442", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" }, { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Validation of Integrity Check Value Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22442", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-123", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380877", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22442", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" }, { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "id": "VAR-202108-2213", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380877" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:02.973000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159055" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-354", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "NVD", "id": "CVE-2021-22442" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22442" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/354.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" }, { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" }, { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380877" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22442" }, { "date": "2021-08-02T17:15:14.567000", "db": "NVD", "id": "CVE-2021-22442" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380877" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22442" }, { "date": "2021-12-09T17:55:11.030000", "db": "NVD", "id": "CVE-2021-22442" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-123" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-123" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-123" } ], "trust": 0.6 } }
var-202112-0350
Vulnerability from variot
There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0350", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37050" } ] }, "cve": "CVE-2021-37050", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37050", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398883", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37050", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37050", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2020", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398883", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "VULHUB", "id": "VHN-398883" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37050", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015858", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2020", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398883", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "id": "VAR-202112-0350", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398883" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:07.968000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Missing\u00a0sensitive\u00a0data\u00a0encryption\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173788" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-311", "trust": 1.1 }, { "problemtype": "Lack of encryption of critical data (CWE-311) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37050" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398883" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "date": "2021-12-08T15:15:09.480000", "db": "NVD", "id": "CVE-2021-37050" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398883" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "date": "2021-12-09T17:58:47.893000", "db": "NVD", "id": "CVE-2021-37050" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of encryption of important data in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2020" } ], "trust": 0.6 } }
var-202203-0260
Vulnerability from variot
There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability. Huawei of HarmonyOS , EMUI , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0260", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40052" } ] }, "cve": "CVE-2021-40052", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40052", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401453", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40052", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40052", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-984", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401453", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-40052", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability. Huawei of HarmonyOS , EMUI , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40052", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018712", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-984", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401453", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40052", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "id": "VAR-202203-0260", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401453" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:16.265000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=203865" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2021-40052 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40052" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40052/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2021-40052" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401453" }, { "date": "2022-03-10T00:00:00", "db": "VULMON", "id": "CVE-2021-40052" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "date": "2022-03-10T17:43:18.923000", "db": "NVD", "id": "CVE-2021-40052" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-19T00:00:00", "db": "VULHUB", "id": "VHN-401453" }, { "date": "2023-01-19T00:00:00", "db": "VULMON", "id": "CVE-2021-40052" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "date": "2023-01-19T03:30:20.603000", "db": "NVD", "id": "CVE-2021-40052" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-984" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer size miscalculation vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018712" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-984" } ], "trust": 0.6 } }
var-202210-0251
Vulnerability from variot
The DFX unwind stack module of the ArkCompiler has a vulnerability in interface calling.Successful exploitation of this vulnerability affects system services and device availability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0251", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" } ] }, "cve": "CVE-2022-41589", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-41589", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-166", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX unwind stack module of the ArkCompiler has a vulnerability in interface calling.Successful exploitation of this vulnerability affects system services and device availability", "sources": [ { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "VULHUB", "id": "VHN-437822" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-41589", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-202210-166", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-437822", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-437822" }, { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "id": "VAR-202210-0251", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-437822" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:10.320000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=211148" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2022-41589" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-41589/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" } ], "sources": [ { "db": "VULHUB", "id": "VHN-437822" }, { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-437822" }, { "db": "NVD", "id": "CVE-2022-41589" }, { "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-14T00:00:00", "db": "VULHUB", "id": "VHN-437822" }, { "date": "2022-10-14T16:15:25.717000", "db": "NVD", "id": "CVE-2022-41589" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-18T00:00:00", "db": "VULHUB", "id": "VHN-437822" }, { "date": "2022-10-18T17:10:49.960000", "db": "NVD", "id": "CVE-2022-41589" }, { "date": "2022-10-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-166" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-166" } ], "trust": 0.6 } }
var-202201-1040
Vulnerability from variot
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1040", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40035" } ] }, "cve": "CVE-2021-40035", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40035", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401436", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40035", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40035", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-280", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401436", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "VULHUB", "id": "VHN-401436" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40035", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002908", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-280", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-13181", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401436", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "id": "VAR-202201-1040", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401436" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:35.992000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177446" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40035" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401436" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "date": "2022-01-10T14:10:22.360000", "db": "NVD", "id": "CVE-2021-40035" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401436" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "date": "2022-01-13T15:32:16.207000", "db": "NVD", "id": "CVE-2021-40035" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-280" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-280" } ], "trust": 0.6 } }
var-202207-0144
Vulnerability from variot
The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0144", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34743" } ] }, "cve": "CVE-2022-34743", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34743", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427078", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34743", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34743", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-417", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427078", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34743", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34743", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013197", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-417", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52823", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427078", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34743", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "id": "VAR-202207-0144", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427078" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:52.335000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200889" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34743" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34743/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427078" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34743" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "date": "2022-07-12T14:15:19.570000", "db": "NVD", "id": "CVE-2022-34743" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427078" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34743" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "date": "2022-07-19T12:53:51.187000", "db": "NVD", "id": "CVE-2022-34743" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013197" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ], "trust": 0.6 } }
var-202203-0972
Vulnerability from variot
There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0972", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40050" } ] }, "cve": "CVE-2021-40050", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-40050", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-401451", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40050", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40050", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202203-986", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401451", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "VULHUB", "id": "VHN-401451" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40050", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018714", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-986", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401451", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "id": "VAR-202203-0972", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401451" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:26.711000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186013" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40050" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40050/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401451" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "date": "2022-03-10T17:43:17.980000", "db": "NVD", "id": "CVE-2021-40050" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401451" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "date": "2022-03-14T15:40:09.787000", "db": "NVD", "id": "CVE-2021-40050" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018714" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ], "trust": 0.6 } }
cve-2021-40035
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability due to a boundary error with the Samba server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:36", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability due to a boundary error with the Samba server" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40035", "datePublished": "2022-01-07T22:39:36", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22482
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.047Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Uninitialized variable vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of invalid data." } ], "problemTypes": [ { "descriptions": [ { "description": "Uninitialized variable vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22482", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Uninitialized variable vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of invalid data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uninitialized variable vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22482", "datePublished": "2021-10-28T12:21:27", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41583
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The storage maintenance and debugging module has an array out-of-bounds read vulnerability.Successful exploitation of this vulnerability will cause incorrect statistics of this module." } ], "problemTypes": [ { "descriptions": [ { "description": "Array out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41583", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40032
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T13:05:00.909Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40032", "datePublished": "2022-01-07T22:39:47", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52388
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52388", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:57:39.777962Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T19:46:54.793Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the clock module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission control vulnerability in the clock module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:39:24.594Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52388", "datePublished": "2024-04-08T08:39:24.594Z", "dateReserved": "2024-01-26T06:51:31.238Z", "dateUpdated": "2024-08-29T19:46:54.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31227
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:31.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The hwPartsDFR module has a vulnerability in API calling verification. Successful exploitation of this vulnerability may affect device confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-31227", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-02T14:53:31.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48347
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.778Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MediaProvider module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48347", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39994
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Aarbitrary address access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Aarbitrary address access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39994", "datePublished": "2022-02-09T22:03:54", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40057
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.783Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based and stack-based buffer overflow vulnerabilities", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40057", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based and stack-based buffer overflow vulnerabilities" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40057", "datePublished": "2022-03-07T13:50:03", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37093
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37093", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37093", "datePublished": "2021-12-08T14:13:11", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34162
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Version update determination vulnerability in the user profile module.Successful exploitation of this vulnerability may cause repeated HMS Core updates and cause services to fail." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34162", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48509
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability due to multi-thread access to mutually exclusive resources in Huawei Share. Successful exploitation of this vulnerability may cause the program to exit abnormally." } ], "value": "Race condition vulnerability due to multi-thread access to mutually exclusive resources in Huawei Share. Successful exploitation of this vulnerability may cause the program to exit abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:38:03.921Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48509", "datePublished": "2023-07-06T12:38:03.921Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37114
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37114", "datePublished": "2022-01-03T21:07:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37107
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.777Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper memory access permission configuration on ACPU.Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Privilege Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper memory access permission configuration on ACPU.Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37107", "datePublished": "2022-02-09T22:03:52", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22395
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Code injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22395", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22395", "datePublished": "2022-02-25T18:11:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48495
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.534Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of unauthorized access to foreground app information.Successful exploitation of this vulnerability may cause foreground app information to be obtained." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48495", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.534Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41298
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41298", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:13:10.275479Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:13:21.160Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of permission control in the window module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:40:32.313Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41298", "datePublished": "2023-09-25T11:40:32.313Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:13:21.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52366
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52366", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T17:52:49.069888Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-22T17:55:49.955Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:27:57.409Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52366", "datePublished": "2024-02-18T03:27:57.409Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-22T17:55:49.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41307
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41307", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T19:58:38.157924Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T20:00:44.351Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Memory overwriting vulnerability in the security module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:16:21.629Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41307", "datePublished": "2023-09-26T01:16:21.629Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T20:00:44.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34159
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "unspecified" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "unspecified" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper permission control vulnerability in the Notepad app.Successful exploitation of the vulnerability may lead to privilege escalation, which affects availability and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34159", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.212Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51528
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51528", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:39.394302Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:52:17.319Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper log printing in the Super Home Screen module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper log printing in the Super Home Screen module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:33:14.126Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51528", "datePublished": "2024-11-05T09:33:14.126Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:52:17.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41576
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:41.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The rphone module has a script that can be maliciously modified.Successful exploitation of this vulnerability may cause irreversible programs to be implanted on user devices." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41576", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:41.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37110
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;Harmony OS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.835Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;Harmony OS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "status": "affected", "version": "Harmony OS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Timing design defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37110", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;Harmony OS", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "version_value": "Harmony OS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Timing design defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37110", "datePublished": "2022-01-03T21:07:44", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.835Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40017
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40017", "datePublished": "2022-09-16T00:00:00", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36998
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36998", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36998", "datePublished": "2021-10-28T12:27:26", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40050
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40050", "datePublished": "2022-03-07T13:50:49", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48287
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48287", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52544
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52544", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T19:27:33.584526Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-04T14:37:45.737Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.880Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of file path verification being bypassed in the email module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of file path verification being bypassed in the email module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:52:13.485Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52544", "datePublished": "2024-04-08T08:52:13.485Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-11-04T14:37:45.737Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22407
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22407", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22407", "datePublished": "2021-10-28T12:22:28", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38996
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.719Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38996", "datePublished": "2022-09-16T17:57:04", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.719Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49247
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:32:36.621Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49247", "datePublished": "2023-12-06T08:32:36.621Z", "dateReserved": "2023-11-24T07:33:47.176Z", "dateUpdated": "2024-08-02T21:53:45.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46764
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46764", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:42:56.382210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-15", "description": "CWE-15 External Control of System or Configuration Setting", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:50:14.654Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized startup vulnerability of background apps. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "value": "Unauthorized startup vulnerability of background apps. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:10:02.277Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46764", "datePublished": "2023-11-08T10:10:02.277Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T14:50:14.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22381
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:39:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22381", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22381", "datePublished": "2021-08-02T16:39:25", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.291Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36999
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper\u807dRestriction\u807dof\u807dOperations\u807dwithin\u807dthe\u807dBounds\u807dof\u807da\u807dMemory\u807dBuffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36999", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper\u807dRestriction\u807dof\u807dOperations\u807dwithin\u807dthe\u807dBounds\u807dof\u807da\u807dMemory\u807dBuffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36999", "datePublished": "2021-10-28T12:27:34", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22487
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.015Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22487", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22487", "datePublished": "2021-10-28T12:25:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22481
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22481", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22481", "datePublished": "2021-10-28T12:21:20", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46768
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46768", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:58:05.239312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:58:19.576Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multi-thread vulnerability in the idmap module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Multi-thread vulnerability in the idmap module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:51:12.992Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46768", "datePublished": "2023-11-08T02:51:12.992Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T14:58:19.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22414
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" }, { "status": "affected", "version": "8.2" }, { "status": "affected", "version": "8.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Errors Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:47:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22414", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" }, { "version_affected": "=", "version_value": "8.2" }, { "version_affected": "=", "version_value": "8.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Errors Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22414", "datePublished": "2021-08-02T16:47:23", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34160
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34160", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37069
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37069", "datePublished": "2021-12-08T14:12:48", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52103
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52103", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T17:39:09.904038Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T14:35:16.766Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the FLP module. Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "value": "Buffer overflow vulnerability in the FLP module. Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:20:52.658Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52103", "datePublished": "2024-01-16T09:20:52.658Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-29T14:35:16.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37006
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "status": "affected", "version": "EMUI 12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:53:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "version_value": "EMUI 12.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37006", "datePublished": "2022-08-09T20:11:35", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40029
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability due to a boundary error with the Samba server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability due to a boundary error with the Samba server" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40029", "datePublished": "2022-01-07T22:39:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40023
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.542Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40023", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40023", "datePublished": "2022-09-16T17:57:57", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39001
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.038Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39001", "datePublished": "2022-09-16T17:57:48", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36987
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Double Release", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double Release" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36987", "datePublished": "2021-10-28T12:25:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46741
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:41.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46741", "datePublished": "2022-07-11T13:52:47", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:41.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41581
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41581", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37047
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.767Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Input verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37047", "datePublished": "2021-12-07T15:45:26", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.767Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44559
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.783Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44559", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41303
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41303", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:00:18.374761Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:00:59.226Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified." } ], "value": "Command injection vulnerability in the distributed file system module. Successful exploitation of this vulnerability may cause variables in the sock structure to be modified." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:21:38.790Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41303", "datePublished": "2023-09-25T12:21:38.790Z", "dateReserved": "2023-08-28T12:17:09.165Z", "dateUpdated": "2024-09-24T15:00:59.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37074
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.702Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37074", "datePublished": "2021-12-08T14:12:53", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52720
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52720", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:52:05.669063Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:24:04.948Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the soundtrigger module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Race condition vulnerability in the soundtrigger module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:06:34.278Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52720", "datePublished": "2024-05-11T10:06:34.278Z", "dateReserved": "2024-04-23T03:42:13.136Z", "dateUpdated": "2024-08-02T23:11:35.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42038
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42038", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T15:22:20.484788Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T15:22:32.499Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of PIN enhancement failures in the screen lock module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Vulnerability of PIN enhancement failures in the screen lock module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-310", "description": "CWE-310 Cryptographic Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:31:40.594Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42038", "datePublished": "2024-08-08T09:31:40.594Z", "dateReserved": "2024-07-27T06:52:58.401Z", "dateUpdated": "2024-08-08T15:22:32.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9140
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2020/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.131Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability with buffer access with incorrect length value in some Huawei Smartphone.Unauthorized users may trigger code execution when a buffer overflow occurs." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Access with Incorrect Length Value", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-13T21:55:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability with buffer access with incorrect length value in some Huawei Smartphone.Unauthorized users may trigger code execution when a buffer overflow occurs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Access with Incorrect Length Value" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2020/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9140", "datePublished": "2021-01-13T21:55:57", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22406
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22406", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncaught Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22406", "datePublished": "2021-10-28T12:22:22", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.130Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46887
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Lack of length check vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46887", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48606
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48606", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:36:50.235502Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:37:44.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Stability-related vulnerability in the binder background management and control module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Stability-related vulnerability in the binder background management and control module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:27:26.749Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48606", "datePublished": "2023-09-26T01:27:26.749Z", "dateReserved": "2023-08-28T12:36:19.571Z", "dateUpdated": "2024-09-24T14:37:44.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48520
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:55:24.026Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48520", "datePublished": "2023-07-06T12:55:24.026Z", "dateReserved": "2023-06-29T11:26:45.309Z", "dateUpdated": "2024-08-03T15:17:54.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52377
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52377", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:30:12.614245Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-27T20:09:51.732Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "value": "Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:07:47.380Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52377", "datePublished": "2024-02-18T06:07:47.380Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.602Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38990
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38990", "datePublished": "2022-09-16T17:55:50", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44098
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44098", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:58:32.844989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T18:59:04.570Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing encryption in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of missing encryption in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:02:05.173Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44098", "datePublished": "2023-11-08T09:02:05.173Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-04T18:59:04.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22447
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T17:39:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22447", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Check for Unusual or Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22447", "datePublished": "2021-08-02T17:39:56", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46315
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.\u003c/p\u003e" } ], "value": "The ProfileSDK has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T03:51:33.193Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46315", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46758
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46758", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:31:06.737289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:32:13.777Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-09T07:51:25.463Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46758", "datePublished": "2023-11-08T10:18:22.152Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:32:13.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44549
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The LBS module has a vulnerability in geofencing API access. Successful exploitation of this vulnerability may cause third-party apps to access the geofencing APIs without authorization, affecting user confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Geofencing API access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44549", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.486Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36995
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36995", "datePublished": "2021-10-28T12:27:06", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39998
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 11.0.1" }, { "status": "affected", "version": "Magic UI 4.0.0" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Concurrently called for multiple times", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39998", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 11.0.1" }, { "version_value": "Magic UI 4.0.0" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Concurrently called for multiple times" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39998", "datePublished": "2022-01-07T22:39:48", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41308
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41308", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T19:55:49.839413Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T19:57:16.117Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Screenshot vulnerability in the input module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:17:42.728Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41308", "datePublished": "2023-09-26T01:17:42.728Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T19:57:16.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22385
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the Huawei smartphone has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution." } ], "problemTypes": [ { "descriptions": [ { "description": "External Control of System or Configuration Setting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T13:04:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the Huawei smartphone has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "External Control of System or Configuration Setting" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22385", "datePublished": "2021-08-10T13:04:34", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22428
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:54:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22428", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22428", "datePublished": "2021-08-02T16:54:27", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22489
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22489", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22489", "datePublished": "2022-02-25T18:11:03", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48348
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MediaProvider module has a vulnerability of unauthorized data read. Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized data read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48348", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41302
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41302", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:13:33.968642Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:14:54.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:16:12.190Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41302", "datePublished": "2023-09-25T12:16:12.190Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T15:14:54.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36990
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36990", "datePublished": "2021-10-28T12:26:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22346
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to the disclosure of user habits." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Permission Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T20:55:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22346", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to the disclosure of user habits." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Permission Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22346", "datePublished": "2021-06-30T20:55:40", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41594
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41594", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48512
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.801Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the Vdecoderservice service. Successful exploitation of this vulnerability may cause the image decoding feature to perform abnormally." } ], "value": "Use After Free (UAF) vulnerability in the Vdecoderservice service. Successful exploitation of this vulnerability may cause the image decoding feature to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:22:38.489Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48512", "datePublished": "2023-07-06T12:22:38.489Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-08-03T15:17:54.801Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39969
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized file access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39969", "datePublished": "2022-01-03T21:07:42", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48353
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause kernel privilege escalation, which results in system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48353", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30413
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-30413", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T21:08:21.415115Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:39:08.686Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:03:09.240Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30413", "datePublished": "2024-04-07T08:03:09.240Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-08-02T01:32:07.291Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1696
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability." } ], "value": "The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:15:55.847Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1696", "datePublished": "2023-05-20T14:15:55.847Z", "dateReserved": "2023-03-29T09:29:54.744Z", "dateUpdated": "2024-08-02T05:57:24.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22350
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0, EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0, Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the device to crash and restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Improper Operation Limit Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T20:10:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22350", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0, EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0, Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the device to crash and restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Improper Operation Limit Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22350", "datePublished": "2021-06-30T20:10:16", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40060
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40060", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40060", "datePublished": "2022-03-07T13:49:47", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39006
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39006", "datePublished": "2022-09-16T17:55:56", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22446
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T17:39:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22446", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22446", "datePublished": "2021-08-02T17:39:43", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44548
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability in permission verification during the Bluetooth pairing process. Successful exploitation of this vulnerability may cause the dialog box for confirming the pairing not to be displayed during Bluetooth pairing." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44548", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44554
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The power module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause abnormal status of a module on the device." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44554", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48313
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.688Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-16T07:07:28.234Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48313", "datePublished": "2023-04-16T07:07:28.234Z", "dateReserved": "2023-02-06T03:32:29.062Z", "dateUpdated": "2024-08-03T15:10:59.688Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46742
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized insertion vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized insertion vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46742", "datePublished": "2022-04-11T19:38:22", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37241
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Input verification vulnerability in the WMS API. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:30:10.304Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37241", "datePublished": "2023-07-06T12:30:10.304Z", "dateReserved": "2023-06-29T10:23:01.714Z", "dateUpdated": "2024-08-02T17:09:34.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39395
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39395", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:05:04.729317Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:46:38.456Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Mismatch vulnerability in the serialization process in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "value": "Mismatch vulnerability in the serialization process in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-19", "description": "CWE-19 Data Processing Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:31:31.535Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39395", "datePublished": "2023-08-13T12:31:31.535Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:46:38.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22372
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Security Features Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Security Features", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T13:54:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22372", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0" }, { "version_value": "Magic UI 4.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Security Features Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Security Features" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22372", "datePublished": "2021-06-30T13:54:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41595
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.288Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41595", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34735
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:52:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34735", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34735", "datePublished": "2022-07-11T13:52:53", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22252
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:10:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22252", "datePublished": "2022-05-13T15:10:19", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31751
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Multi-thread contention vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31751", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multi-thread contention vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31751", "datePublished": "2022-06-13T14:55:41", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42032
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42032", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:05:22.021292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T13:10:34.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the Contacts module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the Contacts module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:05:15.059Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42032", "datePublished": "2024-08-08T09:05:15.059Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T13:10:34.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22426
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22426", "datePublished": "2022-02-25T18:11:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22336
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/4/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Control of Generation of Code vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause denial of security services on a rooted device." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Control of Generation of Code", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T16:30:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Control of Generation of Code vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause denial of security services on a rooted device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Control of Generation of Code" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22336", "datePublished": "2021-06-03T16:30:27", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39402
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39402", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:22.979308Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:34:13.756Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:38:45.202Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39402", "datePublished": "2023-08-13T12:38:45.202Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:34:13.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45446
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45446", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:12:25.875459Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:12:39.116Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the camera driver module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Access permission verification vulnerability in the camera driver module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:14:48.613Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45446", "datePublished": "2024-09-04T02:14:48.613Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:12:39.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52109
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:53:43.467Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52109", "datePublished": "2024-01-16T07:53:43.467Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22368
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permission Control Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect normal use of the device." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Control Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T17:20:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22368", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 10.1.1" }, { "version_value": "Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permission Control Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect normal use of the device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission Control Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22368", "datePublished": "2021-06-30T17:20:09", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29790
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Multi-threaded access to the database vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:04:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29790", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The graphics acceleration service has a vulnerability in multi-thread access to the database.Successful exploitation of this vulnerability may cause service exceptions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multi-threaded access to the database vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29790", "datePublished": "2022-05-13T15:04:14", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41596
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system tool has inconsistent serialization and deserialization. Successful exploitation of this vulnerability will cause unauthorized startup of components." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41596", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27896
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-27896", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T12:25:30.298850Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:46:55.377Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the log module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability can affect integrity." } ], "value": "Input verification vulnerability in the log module.\nImpact: Successful exploitation of this vulnerability can affect integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:24:17.171Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-27896", "datePublished": "2024-04-08T09:24:17.171Z", "dateReserved": "2024-02-27T03:43:01.541Z", "dateUpdated": "2024-08-02T00:41:55.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46760
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46760", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:30:22.935359Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:31:27.423Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:30:02.430Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46760", "datePublished": "2023-11-08T09:30:02.430Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T19:31:27.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39399
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39399", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:26.308780Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:45:19.358Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:35:19.017Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39399", "datePublished": "2023-08-13T12:35:19.017Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:45:19.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41305
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41305", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:07:46.531912Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:08:00.917Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of 5G messages being sent without being encrypted in a VPN environment in the SMS message module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-326", "description": "CWE-326 Inadequate Encryption Strength", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:12:50.286Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41305", "datePublished": "2023-09-26T01:12:50.286Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T18:08:00.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31762
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Input validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31762", "datePublished": "2022-06-13T14:56:38", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22403
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient\u807dVerification\u807dof\u807dData\u807dAuthenticity", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22403", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient\u807dVerification\u807dof\u807dData\u807dAuthenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22403", "datePublished": "2021-10-28T12:21:47", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22260
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:03:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22260", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has a UAF vulnerability.Successful exploitation of this vulnerability will affect data integrity and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22260", "datePublished": "2022-05-13T15:03:30", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48500
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.680Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48500", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.680Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48491
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of missing authentication on certain HUAWEI phones.Successful exploitation of this vulnerability can lead to ads and other windows to display at any time." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48491", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44561
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.775Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The preset launcher module has a permission verification vulnerability. Successful exploitation of this vulnerability makes unauthorized apps add arbitrary widgets and shortcuts without interaction." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44561", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22434
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22434", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22434", "datePublished": "2022-02-25T18:11:07", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48355
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has a heap out-of-bounds read vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48355", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Vulnerability of accessing resources using an incompatible type (type confusion)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Vulnerability of accessing resources using an incompatible type (type confusion)" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40037", "datePublished": "2022-01-07T22:39:37", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46322
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46322", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:43.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The reminder module lacks an authentication mechanism for broadcasts received. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-0116", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-01-09T00:00:00", "dateUpdated": "2024-08-02T05:02:43.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45445
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45445", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:13:22.524221Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:13:31.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of resources not being closed or released in the keystore module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of resources not being closed or released in the keystore module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459 Incomplete Cleanup", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:54:26.309Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45445", "datePublished": "2024-09-04T01:54:26.309Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:13:31.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48486
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48486", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31760
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:03:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31760", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31760", "datePublished": "2022-06-13T15:03:55", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52358
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52358", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T00:10:44.164340Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:39:40.148Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.703Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of configuration defects in some APIs of the audio module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of configuration defects in some APIs of the audio module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:57:29.843Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52358", "datePublished": "2024-02-18T02:57:29.843Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-11-14T19:39:40.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22388
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:43:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22388", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22388", "datePublished": "2021-08-02T16:43:28", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22325
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/3/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T16:10:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22325", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0" }, { "version_value": "Magic UI 4.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22325", "datePublished": "2021-06-03T16:10:48", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-27897
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-27897", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T13:53:56.641126Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T13:56:01.303Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:41:55.777Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the call module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Input verification vulnerability in the call module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:25:40.641Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-27897", "datePublished": "2024-04-08T09:25:40.641Z", "dateReserved": "2024-02-27T03:43:01.541Z", "dateUpdated": "2024-08-02T00:41:55.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40040
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Write data to arbitrary address vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:53:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Write data to arbitrary address vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40040", "datePublished": "2022-08-09T20:11:21", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22308
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/2/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Business Logic Errors vulnerability in Huawei Smartphone. The malicious apps installed on the device can keep taking screenshots in the background. This issue does not cause system errors, but may cause personal information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T15:15:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Business Logic Errors vulnerability in Huawei Smartphone. The malicious apps installed on the device can keep taking screenshots in the background. This issue does not cause system errors, but may cause personal information leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Business Logic Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22308", "datePublished": "2021-06-03T15:15:20", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29793
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0, EMUI 10.1.0, EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 3.1.0, Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:51:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29793", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0, EMUI 10.1.0, EMUI 10.1.1" }, { "version_value": "Magic UI 3.1.0, Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defect vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29793", "datePublished": "2022-05-13T15:05:15", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48291
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an authentication bypass vulnerability in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48291", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52379
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52379", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:30:07.873785Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-30T17:03:08.705Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:10:40.306Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52379", "datePublished": "2024-02-18T06:10:40.306Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-9136
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9136", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:08:07.478210Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:09:37.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the App Multiplier module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the App Multiplier module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:24:09.033Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-9136", "datePublished": "2024-09-27T10:24:09.033Z", "dateReserved": "2024-09-24T06:27:15.239Z", "dateUpdated": "2024-09-27T15:09:37.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22390
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Improper Operation Limit Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:44:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22390", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Improper Operation Limit Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22390", "datePublished": "2021-08-02T16:44:40", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52721
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52721", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-28T20:15:52.408244Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:24:02.872Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The WindowManager module has a vulnerability in permission control.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The WindowManager module has a vulnerability in permission control.\nImpact: Successful exploitation of this vulnerability may affect confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:16:08.629Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52721", "datePublished": "2024-05-11T10:16:08.629Z", "dateReserved": "2024-04-23T03:42:13.137Z", "dateUpdated": "2024-08-02T23:11:35.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39388
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39388", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:48:04.906896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1285", "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:49:34.727Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:28:21.408Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39388", "datePublished": "2023-08-13T11:28:21.408Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:49:34.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission assignment vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission assignment vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37003", "datePublished": "2022-08-09T20:10:59", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46811
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission management vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission management vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46811", "datePublished": "2022-06-13T15:06:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40038
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40038", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double free" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40038", "datePublished": "2022-01-07T22:39:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40024
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information leakage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information leakage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40024", "datePublished": "2022-09-16T17:55:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30417
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-30417", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:45:44.679051Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:38:28.172Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal vulnerability in the Bluetooth-based sharing module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Path traversal vulnerability in the Bluetooth-based sharing module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:16:15.889Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30417", "datePublished": "2024-04-07T08:16:15.889Z", "dateReserved": "2024-03-27T03:38:10.315Z", "dateUpdated": "2024-08-02T01:32:07.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46326
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46326", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:46.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9139
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2020/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a improper input validation vulnerability in some Huawei Smartphone.Successful exploit of this vulnerability can cause memory access errors and denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-13T21:58:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9139", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a improper input validation vulnerability in some Huawei Smartphone.Successful exploit of this vulnerability can cause memory access errors and denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2020/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9139", "datePublished": "2021-01-13T21:58:39", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37002
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37002", "datePublished": "2022-08-09T20:10:52", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48605
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-48605", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:01:52.779080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:07:53.562Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the fingerprint module. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability." } ], "value": "Input verification vulnerability in the fingerprint module. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:20:03.237Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48605", "datePublished": "2023-09-25T12:20:03.237Z", "dateReserved": "2023-08-28T12:36:11.353Z", "dateUpdated": "2024-09-24T15:07:53.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22375
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality,availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Key Management Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T13:43:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22375", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI11.0.0" }, { "version_value": "Magic UI 4.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality,availability and integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Key Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22375", "datePublished": "2021-06-30T13:43:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37007", "datePublished": "2022-08-09T20:10:24", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22347
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.499Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-01T10:58:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22347", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22347", "datePublished": "2021-07-01T10:58:59", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.499Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46771
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46771", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:56:55.647199Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:01:40.614Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Security vulnerability in the face unlock module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Security vulnerability in the face unlock module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:03:34.784Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46771", "datePublished": "2023-11-08T09:03:34.784Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:01:40.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39986
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized rewriting vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized rewriting vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39986", "datePublished": "2022-02-09T22:03:49", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9158
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/1/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI, Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.031Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI, Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "EMUI 10.1.1" }, { "status": "affected", "version": "EMUI 10.1.0" }, { "status": "affected", "version": "EMUI 10.0.0" }, { "status": "affected", "version": "EMUI 9.1.1" }, { "status": "affected", "version": "EMUI 9.1.0" }, { "status": "affected", "version": "EMUI 8.2" }, { "status": "affected", "version": "EMUI 8.0" }, { "status": "affected", "version": "Magic UI 4.0.0" }, { "status": "affected", "version": "Magic UI 3.1.1" }, { "status": "affected", "version": "Magic UI 3.1.0" }, { "status": "affected", "version": "Magic UI 3.0.0" }, { "status": "affected", "version": "Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Missing Cryptographic Step vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS of Samgr." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Cryptographic Step", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-01T11:21:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9158", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI, Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0" }, { "version_value": "EMUI 10.1.1" }, { "version_value": "EMUI 10.1.0" }, { "version_value": "EMUI 10.0.0" }, { "version_value": "EMUI 9.1.1" }, { "version_value": "EMUI 9.1.0" }, { "version_value": "EMUI 8.2" }, { "version_value": "EMUI 8.0" }, { "version_value": "Magic UI 4.0.0" }, { "version_value": "Magic UI 3.1.1" }, { "version_value": "Magic UI 3.1.0" }, { "version_value": "Magic UI 3.0.0" }, { "version_value": "Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Missing Cryptographic Step vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS of Samgr." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Cryptographic Step" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9158", "datePublished": "2021-07-01T11:21:03", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.031Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39401
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39401", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:24.099297Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:34:41.355Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:37:40.608Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39401", "datePublished": "2023-08-13T12:37:40.608Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:34:41.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52374
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52374", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T00:09:06.824259Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:21.893Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the package management module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the package management module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T04:04:47.756Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52374", "datePublished": "2024-02-18T04:04:47.756Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30415
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30415", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T17:41:34.805641Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T17:46:02.363Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:06:02.275Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30415", "datePublished": "2024-04-07T08:06:02.275Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-11-05T17:46:02.363Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1693
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:12:33.342Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1693", "datePublished": "2023-05-20T14:12:33.342Z", "dateReserved": "2023-03-29T09:29:51.236Z", "dateUpdated": "2024-08-02T05:57:24.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22257
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22257", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22257", "datePublished": "2022-04-11T19:38:18", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46765
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46765", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:19:55.559656Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:53:53.424Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:14:18.869Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46765", "datePublished": "2023-11-08T09:14:18.869Z", "dateReserved": "2023-10-26T11:33:04.518Z", "dateUpdated": "2024-10-28T20:53:53.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30414
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30414", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T20:24:29.578357Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T20:28:41.866Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Command injection vulnerability in the AccountManager module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Command injection vulnerability in the AccountManager module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:04:37.661Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30414", "datePublished": "2024-04-07T08:04:37.661Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-08-20T20:28:41.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39002
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39002", "datePublished": "2022-09-16T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36997
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based\u807dBuffer\u807dOverflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based\u807dBuffer\u807dOverflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36997", "datePublished": "2021-10-28T12:27:19", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39386
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39386", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:05:09.310273Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:06:08.131Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause newly installed apps to fail to restart." } ], "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause newly installed apps to fail to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:20:45.686Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39386", "datePublished": "2023-08-13T12:20:45.686Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:06:08.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48496
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48496", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:55.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32992
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32992", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:50:11.792635Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:09.934Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.295Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient verification vulnerability in the baseband module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Insufficient verification vulnerability in the baseband module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:49:03.841Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32992", "datePublished": "2024-05-11T09:49:03.841Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22483
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "IP address spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:24:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22483", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IP address spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22483", "datePublished": "2021-10-28T12:24:52", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40019
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.562Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds heap read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:58:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds heap read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40019", "datePublished": "2022-09-16T17:58:03", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48356
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition module has a vulnerability in input parameter verification. Successful exploitation of this vulnerability may cause failed facial recognition." } ], "problemTypes": [ { "descriptions": [ { "description": "Input parameter verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48356", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52384
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52384", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:53:22.048730Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:56.141Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.781Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Double-free vulnerability in the RSMC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Double-free vulnerability in the RSMC module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:53:58.821Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52384", "datePublished": "2024-05-11T09:53:58.821Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.781Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40053
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:53:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0,HarmonyOS 2.1" }, { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40053", "datePublished": "2022-03-07T13:50:29", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39380
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39380", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:22:05.018130Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:24:16.891Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause audio devices to perform abnormally." } ], "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause audio devices to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:39:45.292Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39380", "datePublished": "2023-08-13T11:39:45.292Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:24:16.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46320
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46320", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22402
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22402", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncaught Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22402", "datePublished": "2021-10-28T12:21:40", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49246
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:01:24.648Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49246", "datePublished": "2023-12-06T09:01:24.648Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52104
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:23:14.259Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52104", "datePublished": "2024-01-16T09:23:14.259Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-02T22:48:12.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41300
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41300", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:56:17.985225Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:56:29.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "Vulnerability of parameters not being strictly verified in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:03:58.711Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41300", "datePublished": "2023-09-25T12:03:58.711Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T15:56:29.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-7265
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-7265", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:01:58.335486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T14:02:07.503Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the lock screen module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability" } ], "value": "Permission verification vulnerability in the lock screen module\nImpact: Successful exploitation of this vulnerability may affect availability" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T08:06:06.977Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-7265", "datePublished": "2024-08-08T08:06:06.977Z", "dateReserved": "2024-05-29T07:55:13.655Z", "dateUpdated": "2024-08-08T14:02:07.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46324
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46324", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:46.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52381
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52381", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T20:43:29.275736Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T20:43:36.385Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:13:23.818Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52381", "datePublished": "2024-02-18T06:13:23.818Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-11-05T20:43:36.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48294
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48294", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9148
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/cn/support/bulletin/2021/1 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages." } ], "problemTypes": [ { "descriptions": [ { "description": "Multiple Unlocks of a Critical Resource", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-01T17:56:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multiple Unlocks of a Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/cn/support/bulletin/2021/1", "refsource": "MISC", "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9148", "datePublished": "2021-04-01T17:56:39", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22343
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration Defect vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-01T11:15:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22343", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration Defect vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22343", "datePublished": "2021-07-01T11:15:32", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44115
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44115", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T18:59:20.274116Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T18:59:37.028Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the Booster module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper permission control in the Booster module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T03:59:40.013Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44115", "datePublished": "2023-11-08T03:59:40.013Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-04T18:59:37.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22485
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "SSID vulnerability with Wi-Fi network connections", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:24:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22485", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SSID vulnerability with Wi-Fi network connections" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22485", "datePublished": "2021-10-28T12:24:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34166
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34166", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42036
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42036", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:02:31.386988Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T14:02:40.553Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the Notepad module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the Notepad module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:28:19.295Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42036", "datePublished": "2024-08-08T09:28:19.295Z", "dateReserved": "2024-07-27T06:52:58.401Z", "dateUpdated": "2024-08-08T14:02:40.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22351
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may induce users to grant permissions on modifying items in the configuration table,causing system exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Credentials Management Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T20:14:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22351", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may induce users to grant permissions on modifying items in the configuration table,causing system exceptions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Credentials Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22351", "datePublished": "2021-06-30T20:14:54", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40012
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect pointer usage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect pointer usage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40012", "datePublished": "2022-07-11T13:53:47", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4046
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4046", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:46:21.735350Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T18:37:53.636Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:26:57.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cracking vulnerability in the OS security module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Cracking vulnerability in the OS security module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:14:22.270Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-4046", "datePublished": "2024-05-11T10:14:22.270Z", "dateReserved": "2024-04-23T03:46:12.366Z", "dateUpdated": "2024-08-01T20:26:57.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52385
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52385", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T19:39:29.529714Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:34:51.936Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the RSMC module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds write vulnerability in the RSMC module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:18:43.493Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52385", "datePublished": "2024-04-08T09:18:43.493Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-11-14T19:34:51.936Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41296
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41296", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:21:43.121477Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:21:50.631Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality." } ], "value": "Vulnerability of missing authorization in the kernel module. Successful exploitation of this vulnerability may affect integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:37:37.692Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41296", "datePublished": "2023-09-25T11:37:37.692Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:21:50.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49244
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission management vulnerability in the multi-user module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:58:41.728Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49244", "datePublished": "2023-12-06T08:58:41.728Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:45.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22415
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Incorrect Calculation of Buffer Size Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause kernel exceptions with the code." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Calculation of Buffer Size", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:48:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22415", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Incorrect Calculation of Buffer Size Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause kernel exceptions with the code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22415", "datePublished": "2021-08-02T16:48:38", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52376
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52376", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T13:29:44.977828Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-212", "description": "CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:13:20.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:06:24.995Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52376", "datePublished": "2024-02-18T06:06:24.995Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-10-28T20:13:20.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22348
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Improper Operation Limit Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T20:48:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Improper Operation Limit Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22348", "datePublished": "2021-06-30T20:48:50", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36991
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36991", "datePublished": "2021-10-28T12:26:37", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52382
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-04-17T06:18:32.562Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "rejectedReasons": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52382", "datePublished": "2024-04-07T08:45:15.270Z", "dateRejected": "2024-04-17T06:18:20.017Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-04-17T06:18:32.562Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.0" }
cve-2021-22373
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Defects Introduced in the Design Process Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Defects Introduced in the Design Process", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T14:04:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22373", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Defects Introduced in the Design Process Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Defects Introduced in the Design Process" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22373", "datePublished": "2021-06-30T14:04:17", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29791
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:04:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29791", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29791", "datePublished": "2022-05-13T15:04:30", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34737
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission assignment vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34737", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission assignment vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34737", "datePublished": "2022-07-11T13:53:35", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48490
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48490", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37041
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37041", "datePublished": "2021-12-07T15:45:10", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39404
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39404", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:22:45.741109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:22:57.466Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:41:04.975Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39404", "datePublished": "2023-08-13T12:41:04.975Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T16:22:57.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52538
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52538", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T18:15:40.744850Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-12T15:47:19.803Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package name verification being bypassed in the HwIms module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of package name verification being bypassed in the HwIms module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:43:01.514Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52538", "datePublished": "2024-04-08T08:43:01.514Z", "dateReserved": "2024-02-27T03:41:51.380Z", "dateUpdated": "2024-08-02T23:03:20.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39385
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39385", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:07:47.374173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:08:18.847Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of configuration defects in the media module of certain products.. Successful exploitation of this vulnerability may cause unauthorized access." } ], "value": "Vulnerability of configuration defects in the media module of certain products.. Successful exploitation of this vulnerability may cause unauthorized access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:19:40.462Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39385", "datePublished": "2023-08-13T12:19:40.462Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:08:18.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52372
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "04.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52372", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:08:27.734292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:20:10.143Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameter verification in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of input parameter verification in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:51:16.108Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52372", "datePublished": "2024-02-18T03:51:16.108Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-29T15:20:10.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3455
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Key management vulnerability on system. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T12:19:46.945Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-3455", "datePublished": "2023-07-05T12:19:46.945Z", "dateReserved": "2023-06-29T10:23:01.404Z", "dateUpdated": "2024-08-02T06:55:03.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44110
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44110", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:08:40.262680Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:08:57.208Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Out-of-bounds access vulnerability in the audio module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:57:43.178Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44110", "datePublished": "2023-10-11T11:57:43.178Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T15:08:57.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9146
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/cn/support/bulletin/2021/1 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.034Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-01T17:53:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9146", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/cn/support/bulletin/2021/1", "refsource": "MISC", "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9146", "datePublished": "2021-04-01T17:53:16", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40048
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect buffer size calculation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:51:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect buffer size calculation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40048", "datePublished": "2022-03-07T13:51:00", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39991
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized rewriting vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized rewriting vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39991", "datePublished": "2022-02-09T22:03:48", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52383
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52383", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:53:54.558902Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:38.176Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Double-free vulnerability in the RSMC module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Double-free vulnerability in the RSMC module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:52:36.457Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52383", "datePublished": "2024-05-11T09:52:36.457Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40020
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds array read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40020", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds array read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40020", "datePublished": "2022-01-07T22:39:32", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44556
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 12.0.0" } ] }, { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "HarmonyOS 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eMissing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability.\u003c/p\u003e" } ], "value": "Missing parameter type validation in the DRM module. Successful exploitation of this vulnerability may affect availability.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Type Conversion or Cast", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T12:59:51.447Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44556", "datePublished": "2022-11-08T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30416
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30416", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T18:27:06.445639Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T18:27:35.333Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the underlying driver module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Use After Free (UAF) vulnerability in the underlying driver module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:07:34.891Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30416", "datePublished": "2024-04-07T08:07:34.891Z", "dateReserved": "2024-03-27T03:38:10.314Z", "dateUpdated": "2024-08-02T01:32:07.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30418
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-30418", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-22T15:01:21.403003Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-22T15:04:09.375Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insufficient permission verification in the app management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of insufficient permission verification in the app management module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:19:56.977Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-30418", "datePublished": "2024-04-07T08:19:56.977Z", "dateReserved": "2024-03-27T03:38:10.315Z", "dateUpdated": "2024-08-22T15:04:09.375Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48516
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability that a unique value can be obtained by a third-party app in the DSoftBus module. Successful exploitation of this vulnerability will affect confidentiality." } ], "value": "Vulnerability that a unique value can be obtained by a third-party app in the DSoftBus module. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:47:17.275Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48516", "datePublished": "2023-07-06T12:47:17.275Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-08-03T15:17:54.657Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48361
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Always On Display (AOD) has a path traversal vulnerability in theme files. Successful exploitation of this vulnerability may cause a failure in reading AOD theme resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48361", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39392
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39392", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:30:49.934527Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:31:21.691Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten." } ], "value": "Vulnerability of insecure signatures in the OsuLogin module. Successful exploitation of this vulnerability may cause OsuLogin to be maliciously modified and overwritten." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:33:13.167Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39392", "datePublished": "2023-08-13T11:33:13.167Z", "dateReserved": "2023-07-31T04:41:36.391Z", "dateUpdated": "2024-10-10T14:31:21.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31753
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31753", "datePublished": "2022-06-13T15:06:07", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52540
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52540", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:03:42.318285Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:24:12.782Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper authentication in the Iaware module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of improper authentication in the Iaware module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:46:23.790Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52540", "datePublished": "2024-04-08T08:46:23.790Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-02T23:03:20.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37121
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration defects in Smartphone.Successful exploitation of this vulnerability may elevate the MEID (IMEI) permission." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37121", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration defects in Smartphone.Successful exploitation of this vulnerability may elevate the MEID (IMEI) permission." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37121", "datePublished": "2022-01-03T21:07:13", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40061
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Type confusion vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40061", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Type confusion vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40061", "datePublished": "2022-03-07T13:49:40", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41597
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41597", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37032
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work." } ], "problemTypes": [ { "descriptions": [ { "description": "Bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:15:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37032", "datePublished": "2021-11-23T15:15:29", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9142
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2020/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap base buffer overflow vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability can cause heap overflow and memory overwriting when the system incorrectly processes the update file." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-13T21:48:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9142", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap base buffer overflow vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability can cause heap overflow and memory overwriting when the system incorrectly processes the update file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2020/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9142", "datePublished": "2021-01-13T21:48:46", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46769
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46769", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:56:12.483627Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:57:04.410Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use-After-Free (UAF) vulnerability in the dubai module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Use-After-Free (UAF) vulnerability in the dubai module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:52:20.476Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46769", "datePublished": "2023-11-08T02:52:20.476Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T14:57:04.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37050
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing sensitive data encryption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing sensitive data encryption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37050", "datePublished": "2021-12-08T14:12:20", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22392
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Calculation of Buffer Size", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:45:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22392", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22392", "datePublished": "2021-08-02T16:45:43", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52378
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52378", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T19:00:23.207930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:15.362Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.780Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incorrect service logic in the WindowManagerServices module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of incorrect service logic in the WindowManagerServices module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:09:05.754Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52378", "datePublished": "2024-02-18T06:09:05.754Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52553
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52553", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-10T18:20:08.622982Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T16:04:10.630Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the Wi-Fi module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Race condition vulnerability in the Wi-Fi module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:00:03.869Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52553", "datePublished": "2024-04-08T09:00:03.869Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-11-05T16:04:10.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52106
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module.\nImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:23:26.566Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52106", "datePublished": "2024-01-16T09:26:20.061Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-09-04T01:23:26.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22323
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.513Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T14:53:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22323", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22323", "datePublished": "2021-06-30T14:53:25", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.513Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52113
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "value": "launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:58:43.439Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52113", "datePublished": "2024-01-16T07:58:43.439Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.460Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48518
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance." } ], "value": "Vulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:53:19.166Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48518", "datePublished": "2023-07-06T12:53:19.166Z", "dateReserved": "2023-06-29T11:23:50.334Z", "dateUpdated": "2024-08-03T15:17:54.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22391
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Calculation of Buffer Size", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:45:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22391", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22391", "datePublished": "2021-08-02T16:45:01", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9147
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/cn/support/bulletin/2021/1 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.124Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers may exploit this vulnerability by carefully constructing attack scenarios to cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Underwrite", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-01T17:51:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9147", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers may exploit this vulnerability by carefully constructing attack scenarios to cause out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Underwrite" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/cn/support/bulletin/2021/1", "refsource": "MISC", "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9147", "datePublished": "2021-04-01T17:51:54", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9145
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2020/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.036Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds Write vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability may cause out-of-bounds access to the physical memory." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-13T19:40:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9145", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0" }, { "version_value": "Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds Write vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability may cause out-of-bounds access to the physical memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2020/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9145", "datePublished": "2021-01-13T19:40:05", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40015
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40015", "datePublished": "2022-02-09T22:03:57", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48286
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The multi-screen collaboration module has a privilege escalation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48286", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37035
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:16:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37035", "datePublished": "2021-11-23T15:16:40", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22401
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.860Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22401", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncaught Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22401", "datePublished": "2021-10-28T12:21:33", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22333
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/4/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Validation of Array Index vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute, thus obtaining system permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Array Index", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T19:15:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22333", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Validation of Array Index vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute, thus obtaining system permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Array Index" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22333", "datePublished": "2021-06-03T19:15:26", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46852
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.716Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The memory management module has the logic bypass vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46852", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-04T05:17:42.716Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37054
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Identity spoofing and authentication bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Identity spoofing and authentication bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37054", "datePublished": "2021-12-08T14:12:42", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48314
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Bluetooth vulnerability confidentiality", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-16T07:11:54.749Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48314", "datePublished": "2023-04-16T07:11:54.749Z", "dateReserved": "2023-02-06T03:32:29.062Z", "dateUpdated": "2024-08-03T15:10:59.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52714
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52714", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:33:25.143460Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-657", "description": "CWE-657 Violation of Secure Design Principles", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T18:38:40.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the hwnff module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of defects introduced in the design process in the hwnff module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:43:50.830Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52714", "datePublished": "2024-04-07T08:43:50.830Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-08-14T18:38:40.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44555
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The DDMP/ODMF module has a service hijacking vulnerability. Successful exploit of this vulnerability may cause services to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Service hijacking vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44555", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41312
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.968Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41312", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T17:42:24.301075Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T17:42:32.332Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause several apps to be activated automatically." } ], "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause several apps to be activated automatically." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:23:42.389Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41312", "datePublished": "2023-09-26T01:23:42.389Z", "dateReserved": "2023-08-28T12:17:09.167Z", "dateUpdated": "2024-09-24T17:42:32.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38995
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38995", "datePublished": "2022-09-16T17:57:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22437
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access." } ], "problemTypes": [ { "descriptions": [ { "description": "TOCTOU condition vulnerability caused by software integer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22437", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "TOCTOU condition vulnerability caused by software integer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22437", "datePublished": "2022-02-25T18:11:01", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40044
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.466Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Handling of Insufficient Permissions or Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40044", "datePublished": "2022-02-09T22:03:56", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44096
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44096", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:35:45.799069Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:36:12.855Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": " Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:39:45.891Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44096", "datePublished": "2023-10-11T10:37:38.290Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:36:12.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29795
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:05:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29795", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29795", "datePublished": "2022-05-13T15:05:43", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1691
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:50:39.273Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1691", "datePublished": "2023-07-06T12:50:39.273Z", "dateReserved": "2023-03-29T09:29:47.827Z", "dateUpdated": "2024-08-02T05:57:24.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-36600
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:30:08.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:58:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-36600", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-36600", "datePublished": "2022-09-16T17:58:09", "dateReserved": "2022-08-24T00:00:00", "dateUpdated": "2024-08-04T17:30:08.525Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38991
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38991", "datePublished": "2022-09-16T17:56:49", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44095
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44095", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:31:08.203080Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:31:50.182Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash." } ], "value": "Use-After-Free (UAF) vulnerability in the surfaceflinger module.Successful exploitation of this vulnerability can cause system crash." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:44:10.955Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44095", "datePublished": "2023-10-11T11:44:10.955Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:31:50.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47975
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DUBAI module has a double free vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-47975", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-03T15:02:36.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48511
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.798Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the audio PCM driver module under special conditions. Successful exploitation of this vulnerability may cause audio features to perform abnormally." } ], "value": "Use After Free (UAF) vulnerability in the audio PCM driver module under special conditions. Successful exploitation of this vulnerability may cause audio features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:39:53.975Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48511", "datePublished": "2023-07-06T12:39:53.975Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.798Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22313
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/2/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Security Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Security Function", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T15:19:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22313", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Security Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Security Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22313", "datePublished": "2021-06-03T15:19:46", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31758
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31758", "datePublished": "2022-06-13T14:55:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37033
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Injection attack vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:16:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Injection attack vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37033", "datePublished": "2021-11-23T15:16:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0117
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:02:43.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The online authentication provided by the hwKitAssistant lacks strict identity verification of applications. Successful exploitation of this vulnerability may affect availability of features,such as MeeTime." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-0117", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-01-09T00:00:00", "dateUpdated": "2024-08-02T05:02:43.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32998
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32998", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:47:47.527475Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:47.415Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "NULL pointer access vulnerability in the clock module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "NULL pointer access vulnerability in the clock module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "CWE-824 Access of Uninitialized Pointer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:08:09.604Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32998", "datePublished": "2024-05-11T10:08:09.604Z", "dateReserved": "2024-04-23T03:44:12.574Z", "dateUpdated": "2024-08-02T02:27:53.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44117
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:49:56.189Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44117", "datePublished": "2024-01-16T07:49:56.189Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-08-02T19:59:50.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8298
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8298", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:06:53.827509Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:07:09.553Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory request vulnerability in the memory management module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Memory request vulnerability in the memory management module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:22:15.826Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-8298", "datePublished": "2024-09-04T02:22:15.826Z", "dateReserved": "2024-08-29T06:20:19.754Z", "dateUpdated": "2024-09-04T13:07:09.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26549
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:53.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a vulnerability of repeated app restart due to improper parameters. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper parameters vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-26549", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-02T11:53:53.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32990
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32990", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:50:58.531221Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:27.380Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the system sharing pop-up module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the system sharing pop-up module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:39:48.843Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32990", "datePublished": "2024-05-11T09:44:25.800Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39010", "datePublished": "2022-09-16T17:57:54", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44094
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44094", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:32:58.483149Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:33:23.135Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:43:24.196Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44094", "datePublished": "2023-10-11T10:43:24.196Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:33:23.135Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52550
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52550", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T19:25:50.849949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T19:34:53.596Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of data verification errors in the kernel module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:56:22.568Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52550", "datePublished": "2024-04-08T08:56:22.568Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-08-20T19:34:53.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22432
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuring permission isolation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22432", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuring permission isolation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22432", "datePublished": "2022-02-25T18:11:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37020
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.767Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:01:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37020", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37020", "datePublished": "2021-12-07T16:01:55", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.767Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34739
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings." } ], "problemTypes": [ { "descriptions": [ { "description": "Addition overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34739", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Addition overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34739", "datePublished": "2022-07-11T13:53:23", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44097
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.258Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44097", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:29:38.951364Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:30:16.188Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of the permission to access device SNs being improperly managed.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:46:30.245Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44097", "datePublished": "2023-10-11T11:46:30.245Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:30:16.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40030
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40030", "datePublished": "2022-08-09T20:11:10", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39997
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of unstrict input parameter verification in the audio assembly.Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict input parameter verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of unstrict input parameter verification in the audio assembly.Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict input parameter verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39997", "datePublished": "2022-02-09T22:03:54", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46814
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory read/write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:54:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds memory read/write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46814", "datePublished": "2022-06-13T14:54:56", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22379
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer Underflow (Wrap or Wraparound) Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS of Samgr." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:39:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer Underflow (Wrap or Wraparound) Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS of Samgr." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Underflow (Wrap or Wraparound)" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22379", "datePublished": "2021-08-02T16:39:57", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39382
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39382", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:17:30.687282Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:19:02.446Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Input verification vulnerability in the audio module. Successful exploitation of this vulnerability may cause virtual machines (VMs) to restart." } ], "value": " Input verification vulnerability in the audio module. Successful exploitation of this vulnerability may cause virtual machines (VMs) to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:42:16.914Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39382", "datePublished": "2023-08-13T11:42:16.914Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:19:02.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39383
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39383", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:15:11.224532Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:16:00.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the AMS module. Successful exploitation of this vulnerability may compromise apps\u0027 data security." } ], "value": "Vulnerability of input parameters being not strictly verified in the AMS module. Successful exploitation of this vulnerability may compromise apps\u0027 data security." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:43:27.816Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39383", "datePublished": "2023-08-13T11:43:27.816Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:16:00.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48493
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48493", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37242
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of commands from the modem being intercepted in the atcmdserver module. Attackers may exploit this vulnerability to rewrite the non-volatile random-access memory (NVRAM), or facilitate the exploitation of other vulnerabilities." } ], "value": "Vulnerability of commands from the modem being intercepted in the atcmdserver module. Attackers may exploit this vulnerability to rewrite the non-volatile random-access memory (NVRAM), or facilitate the exploitation of other vulnerabilities." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-639", "description": "CWE-639 Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:31:20.338Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37242", "datePublished": "2023-07-06T12:31:20.338Z", "dateReserved": "2023-06-29T10:23:01.714Z", "dateUpdated": "2024-08-02T17:09:33.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46885
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46885", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39967
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper broadcast permission settings", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper broadcast permission settings" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39967", "datePublished": "2022-01-03T21:07:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22386
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.147Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A component of the Huawei smartphone has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevation of Privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Double Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T13:04:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22386", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 11.0.0" }, { "version_value": "Magic UI 4.0.0" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A component of the Huawei smartphone has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevation of Privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22386", "datePublished": "2021-08-10T13:04:18", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.147Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37117
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37117", "datePublished": "2022-01-03T21:07:29", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52362
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52362", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:01:25.382152Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-28T20:16:12.047Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the lock screen module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission management vulnerability in the lock screen module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:00:55.155Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52362", "datePublished": "2024-02-18T03:00:55.155Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-10-28T20:16:12.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45448
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45448", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:09:15.541476Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:09:23.436Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "5.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Page table protection configuration vulnerability in the trusted firmware module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Page table protection configuration vulnerability in the trusted firmware module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:17:25.555Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45448", "datePublished": "2024-09-04T02:19:20.881Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-11-05T09:17:25.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission verification bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39007", "datePublished": "2022-09-16T17:57:45", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37002
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37002", "datePublished": "2021-10-28T12:27:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48302
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.732Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of lacking permission verification in APIs.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48302", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.732Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39992
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper security permission configuration vulnerability on ACPU.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper security permission configuration vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper security permission configuration vulnerability on ACPU.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper security permission configuration vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39992", "datePublished": "2022-02-09T22:03:53", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46884
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46884", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39406
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39406", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:22:14.506505Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:22:22.713Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the XLayout component. Successful exploitation of this vulnerability may cause apps to forcibly restart." } ], "value": "Permission control vulnerability in the XLayout component. Successful exploitation of this vulnerability may cause apps to forcibly restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:42:27.139Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39406", "datePublished": "2023-08-13T12:42:27.139Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-10-09T16:22:22.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42033
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42033", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T14:11:41.251489Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T14:11:53.494Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module\u003cbr\u003empact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Access control vulnerability in the security verification module\nmpact: Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:21:20.866Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42033", "datePublished": "2024-08-08T09:21:20.866Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T14:11:53.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46755
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46755", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T20:31:15.646377Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-03T20:34:53.624Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the input. Successful exploitation of this vulnerability may cause the launcher to restart." } ], "value": "Vulnerability of input parameters being not strictly verified in the input. Successful exploitation of this vulnerability may cause the launcher to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:11:18.525Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46755", "datePublished": "2023-11-08T10:11:18.525Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-03T20:34:53.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22374
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Validation of Array Index Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause stability risks." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Array Index", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T14:42:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22374", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Validation of Array Index Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause stability risks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Array Index" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22374", "datePublished": "2021-06-30T14:42:52", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:12:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40010", "datePublished": "2022-01-07T22:39:40", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44108", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T17:56:18.332635Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T17:58:04.587Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "CWE-843 Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:08:10.395Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44108", "datePublished": "2023-10-11T12:08:10.395Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T17:58:04.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46319
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Fingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46319", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39966
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Uninitialized AOD driver structure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uninitialized AOD driver structure" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39966", "datePublished": "2022-01-03T21:07:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40065
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic error vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40065", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic error vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40065", "datePublished": "2022-04-11T19:38:24", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1692
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:10:55.121Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1692", "datePublished": "2023-05-20T14:10:55.121Z", "dateReserved": "2023-03-29T09:29:50.057Z", "dateUpdated": "2024-08-02T05:57:25.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22472
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficiently\u807dProtected\u807dCredentials", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficiently\u807dProtected\u807dCredentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22472", "datePublished": "2021-10-28T12:22:37", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22254
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22254", "datePublished": "2022-04-11T19:38:21", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44553
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiView module has a vulnerability of not filtering third-party apps out when the HiView module traverses to invoke the system provider. Successful exploitation of this vulnerability may cause third-party apps to start periodically." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44553", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:58:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39003", "datePublished": "2022-09-16T17:58:06", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52552
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52552", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T19:54:32.665219Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T20:00:53.549Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the power module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Input verification vulnerability in the power module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:58:38.190Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52552", "datePublished": "2024-04-08T08:58:38.190Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-08-20T20:00:53.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46325
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46325", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:46.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37092
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37092", "datePublished": "2021-12-08T14:13:05", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52554
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:21.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52554", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:12:54.929330Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T20:04:07.961Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the Bluetooth module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the Bluetooth module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:01:09.572Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52554", "datePublished": "2024-04-08T09:01:09.572Z", "dateReserved": "2024-02-27T03:41:51.383Z", "dateUpdated": "2024-11-05T20:04:07.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46762
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46762", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:35:00.502651Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:36:31.487Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:32:04.437Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46762", "datePublished": "2023-11-08T09:32:04.437Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T19:36:31.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48508
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity." } ], "value": " Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:21:04.259Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48508", "datePublished": "2023-07-06T12:21:04.259Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22436
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Logic Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic Bypass Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Logic Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logic Bypass Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22436", "datePublished": "2021-10-28T12:21:15", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39009", "datePublished": "2022-09-16T17:57:50", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48489
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.759Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48489", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.759Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34163
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Permission control vulnerability in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34163", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.212Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44111", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:05:50.005560Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:06:27.540Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of brute-force attacks on the device authentication module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:59:01.687Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44111", "datePublished": "2023-10-11T11:59:01.687Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T15:06:27.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47976
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections." } ], "problemTypes": [ { "descriptions": [ { "description": "Control connection replacement vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-47976", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-03T15:02:36.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52364
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52364", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T17:22:28.968203Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-01T17:49:02.979Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the RSMC module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may cause out-of-bounds write." } ], "value": "Vulnerability of input parameters being not strictly verified in the RSMC module.\nImpact: Successful exploitation of this vulnerability may cause out-of-bounds write." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:21:32.876Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52364", "datePublished": "2024-04-08T09:21:32.876Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-11-01T17:49:02.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46881
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46881", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48480
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer overflow vulnerability in some phones. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow to Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48480", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-03T15:17:54.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4565
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-4565", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T17:52:57.918108Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T17:58:51.981Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the framework module. Successful exploitation of this vulnerability may cause the hotspot feature to be unavailable." } ], "value": "Broadcast permission control vulnerability in the framework module. Successful exploitation of this vulnerability may cause the hotspot feature to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:25:36.605Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-4565", "datePublished": "2023-09-26T01:25:36.605Z", "dateReserved": "2023-08-28T12:18:27.503Z", "dateUpdated": "2024-09-24T17:58:51.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52360
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52360", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:25:16.451936Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-30T17:20:17.770Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Logic vulnerabilities in the baseband.Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Logic vulnerabilities in the baseband.Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:58:49.848Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52360", "datePublished": "2024-02-18T02:58:49.848Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-08-02T22:55:41.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37029
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Identity verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:14:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Identity verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37029", "datePublished": "2021-11-23T15:14:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41297
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41297", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:16:34.540132Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:16:44.175Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking." } ], "value": "Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:39:06.939Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41297", "datePublished": "2023-09-25T11:39:06.939Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:16:44.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52541
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52541", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-31T15:03:18.996179Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-31T15:05:06.846Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Authentication vulnerability in the API for app pre-loading.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Authentication vulnerability in the API for app pre-loading.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:47:29.919Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52541", "datePublished": "2024-04-08T08:47:29.919Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-10-31T15:05:06.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46321
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Wi-Fi module has a vulnerability in permission verification. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46321", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22473
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication (including session management) vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22473", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication (including session management) vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22473", "datePublished": "2021-10-28T12:22:43", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22442
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Validation of Integrity Check Value Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Integrity Check Value", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:56:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22442", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Validation of Integrity Check Value Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Integrity Check Value" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22442", "datePublished": "2021-08-02T16:56:16", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46785
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:01:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46785", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Property module has a vulnerability in permission control.This vulnerability can be exploited to obtain the unique device identifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46785", "datePublished": "2022-05-13T15:01:58", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48298
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:58.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The geofencing kernel code does not verify the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48298", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:58.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46766
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46766", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:22:22.671109Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:24:05.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:16:02.973Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46766", "datePublished": "2023-11-08T09:16:02.973Z", "dateReserved": "2023-10-26T11:33:04.518Z", "dateUpdated": "2024-09-04T19:24:05.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37096
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Input Validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:06:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Input Validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37096", "datePublished": "2021-12-07T16:06:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46882
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46882", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41592
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41592", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52114
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52114", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T15:16:31.632593Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-27T15:27:35.761Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Data confidentiality vulnerability in the ScreenReader module. Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Data confidentiality vulnerability in the ScreenReader module. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:21:37.633Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52114", "datePublished": "2024-01-16T08:21:37.633Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-27T15:27:35.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22354
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T17:12:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22354", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22354", "datePublished": "2021-06-30T17:12:48", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22445
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.315Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T17:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22445", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22445", "datePublished": "2021-08-02T17:39:34", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41593
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.392Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41593", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40064
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.704Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40064", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40064", "datePublished": "2022-03-07T13:49:22", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.704Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Verification bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Verification bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37008", "datePublished": "2022-08-09T20:10:47", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31759
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Accessing uninitialized pointers vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:56:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31759", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Accessing uninitialized pointers vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31759", "datePublished": "2022-06-13T14:56:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38999
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.489Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper update of reference count vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38999", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper update of reference count vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38999", "datePublished": "2022-09-16T17:57:38", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49245
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:45.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the Huawei Share module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:00:03.721Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49245", "datePublished": "2023-12-06T09:00:03.721Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:45.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36994
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.485Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist." } ], "problemTypes": [ { "descriptions": [ { "description": "Competitive Condition Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Competitive Condition Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36994", "datePublished": "2021-10-28T12:26:58", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44119
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44119", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:11:44.943462Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:11:53.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of mutual exclusion management in the kernel module.Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of mutual exclusion management in the kernel module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-667", "description": "CWE-667 Improper Locking", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:04:19.002Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44119", "datePublished": "2023-10-11T12:04:19.002Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-19T13:11:53.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48488
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of bypassing the default desktop security controls.Successful exploitation of this vulnerability may cause unauthorized modifications to the desktop." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48488", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37005", "datePublished": "2022-08-09T20:11:06", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37049
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37049", "datePublished": "2021-12-08T14:12:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39405
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39405", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:25:00.796235Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:25:55.849Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of out-of-bounds parameter read/write in the Wi-Fi module. Successful exploitation of this vulnerability may cause other apps to be executed with escalated privileges." } ], "value": "Vulnerability of out-of-bounds parameter read/write in the Wi-Fi module. Successful exploitation of this vulnerability may cause other apps to be executed with escalated privileges." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:37:24.597Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39405", "datePublished": "2023-08-13T11:37:24.597Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-10T14:25:55.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22337
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/4/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause leaking of user click data." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T19:20:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause leaking of user click data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22337", "datePublished": "2021-06-03T19:20:26", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22317
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/2/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.526Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T15:30:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22317", "datePublished": "2021-06-03T15:30:45", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22353
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the kernel to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Improper Operation Limit Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T17:06:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22353", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the kernel to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Improper Operation Limit Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22353", "datePublished": "2021-06-30T17:06:52", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46894
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.982Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use After Free (UAF) vulnerability in the uinput module.Successful exploitation of this vulnerability may lead to kernel privilege escalation." } ], "value": "Use After Free (UAF) vulnerability in the uinput module.Successful exploitation of this vulnerability may lead to kernel privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:23:59.118Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46894", "datePublished": "2023-07-06T12:23:59.118Z", "dateReserved": "2023-06-29T11:27:53.897Z", "dateUpdated": "2024-08-04T05:17:42.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22475
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper permission management vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Control Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:24:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper permission management vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission Control Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22475", "datePublished": "2021-10-28T12:24:38", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22389
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permission Control Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Control Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:43:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permission Control Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission Control Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22389", "datePublished": "2021-08-02T16:43:54", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48346
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HwContacts module has a logic bypass vulnerability. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48346", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46328
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the input validation vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Input validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46328", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37133
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:03.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "9.1.0" }, { "status": "affected", "version": "9.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37133", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "9.1.0" }, { "version_affected": "=", "version_value": "9.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.1.1" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized file access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37133", "datePublished": "2022-01-03T21:07:40", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:16:03.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22429
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22429", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22429", "datePublished": "2022-02-25T18:11:12", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38994
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.333Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38994", "datePublished": "2022-09-16T17:56:57", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41577
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel server has a vulnerability of not verifying the length of the data transferred in the user space.Successful exploitation of this vulnerability may cause out-of-bounds read in the kernel, which affects the device confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41577", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52716
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:36.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52716", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T19:05:03.166002Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-13T15:09:48.227Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of starting activities in the background in the ActivityManagerService (AMS) module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of starting activities in the background in the ActivityManagerService (AMS) module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T09:01:32.933Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52716", "datePublished": "2024-04-07T09:01:32.933Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-09-13T15:09:48.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37001
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37001", "datePublished": "2021-10-28T12:27:42", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48499
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48499", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22438
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Improper Operation Limit Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:55:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22438", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Improper Operation Limit Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22438", "datePublished": "2021-08-02T16:55:27", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45442
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45442", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:27:11.335619Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:27:20.571Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of permission verification for APIs in the DownloadProviderMain module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:38:53.322Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45442", "datePublished": "2024-09-04T01:38:53.322Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:27:20.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52367
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:32:35.749077Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-27T20:18:12.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the media library module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Vulnerability of improper access control in the media library module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:32:08.585Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52367", "datePublished": "2024-02-18T03:32:08.585Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38984
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HIPP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38984", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44105
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44105", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:11:19.881014Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:11:26.607Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permissions not being strictly verified in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of permissions not being strictly verified in the window management module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:06:03.840Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44105", "datePublished": "2023-10-11T12:06:03.840Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-19T13:11:26.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40014
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Information Management Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T13:06:11.966Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40014", "datePublished": "2022-01-07T22:39:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-7271
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-7271", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:28:07.668981Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:54:33.854Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the NMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Privilege escalation vulnerability in the NMS module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:49:14.969Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-7271", "datePublished": "2024-07-25T11:49:14.969Z", "dateReserved": "2024-07-08T10:53:54.124Z", "dateUpdated": "2024-08-02T08:57:35.022Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46786
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.429Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:02:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46786", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds memory access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46786", "datePublished": "2022-05-13T15:02:16", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37042
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.783Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37042", "datePublished": "2021-12-07T15:45:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52387
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52387", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T17:04:49.426374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:46.428Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Resource reuse vulnerability in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Resource reuse vulnerability in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Sensitive Information in Resource Not Removed Before Reuse", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:52:24.454Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52387", "datePublished": "2024-02-18T02:52:24.454Z", "dateReserved": "2024-01-26T06:51:31.238Z", "dateUpdated": "2024-08-02T22:55:41.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48513
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.733Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of identity verification being bypassed in the Gallery module. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "value": "Vulnerability of identity verification being bypassed in the Gallery module. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:42:55.069Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48513", "datePublished": "2023-07-06T12:42:55.069Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-08-03T15:17:54.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46893
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unstrict data verification and parameter check. Successful exploitation of this vulnerability may affect integrity." } ], "value": "Vulnerability of unstrict data verification and parameter check. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "unstrict data verification and parameter check", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T12:17:19.514Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46893", "datePublished": "2023-07-05T12:17:19.514Z", "dateReserved": "2023-06-29T11:27:53.897Z", "dateUpdated": "2024-08-04T05:17:42.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41585
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41585", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48498
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48498", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42031
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42031", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T15:24:44.947651Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T15:25:50.230Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the Settings module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the Settings module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:02:51.806Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42031", "datePublished": "2024-08-08T08:56:57.339Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T15:25:50.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44560
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.920Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The launcher module has an Intent redirection vulnerability. Successful exploitation of this vulnerability may cause launcher module data to be modified." } ], "problemTypes": [ { "descriptions": [ { "description": "Intent redirection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44560", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49241
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "API permission control vulnerability in the network management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "API permission control vulnerability in the network management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:48:18.923Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49241", "datePublished": "2023-12-06T08:48:18.923Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22256
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22256", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22256", "datePublished": "2022-04-11T19:38:19", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37120
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.1.1,EMUI 10.1.0" }, { "status": "affected", "version": "Magic UI 3.1.1,Magic UI 3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Double free vulnerability in Smartphone.Successful exploitation of this vulnerability may cause a kernel crash or privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 10.1.1,EMUI 10.1.0" }, { "version_value": "Magic UI 3.1.1,Magic UI 3.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Double free vulnerability in Smartphone.Successful exploitation of this vulnerability may cause a kernel crash or privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double free" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37120", "datePublished": "2022-01-03T21:07:13", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.862Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52370
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52370", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:28:38.235755Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-30T17:15:54.193Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.516Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Stack overflow vulnerability in the network acceleration module.Successful exploitation of this vulnerability may cause unauthorized file access." } ], "value": "Stack overflow vulnerability in the network acceleration module.Successful exploitation of this vulnerability may cause unauthorized file access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:41:29.209Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52370", "datePublished": "2024-02-18T03:41:29.209Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34158
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:53.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34158", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:53.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32999
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32999", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:47:09.626581Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:52:16.031Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cracking vulnerability in the OS security module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Cracking vulnerability in the OS security module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:12:07.046Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32999", "datePublished": "2024-05-11T10:12:07.046Z", "dateReserved": "2024-04-23T03:44:12.574Z", "dateUpdated": "2024-08-02T02:27:53.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39384
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "13.0..0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39384", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:09:02.426531Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:13:33.955Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete permission verification in the input method module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of incomplete permission verification in the input method module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:45:05.132Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39384", "datePublished": "2023-08-13T11:45:05.132Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:13:33.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52098
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.434Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52098", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T15:18:04.751382Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:18:51.409Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of Service (DoS) vulnerability in the DMS module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Denial of Service (DoS) vulnerability in the DMS module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:08:10.154Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52098", "datePublished": "2024-01-16T09:08:10.154Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-10-23T15:18:51.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41601
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41601", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37040
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting." } ], "problemTypes": [ { "descriptions": [ { "description": "Parameter injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Parameter injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37040", "datePublished": "2021-12-08T14:11:56", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37051
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37051", "datePublished": "2021-12-08T14:12:25", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39396
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39396", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:26:55.311412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:28:38.710Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Deserialization vulnerability in the input module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Deserialization vulnerability in the input module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:35:42.259Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39396", "datePublished": "2023-08-13T11:35:42.259Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-10T14:28:38.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52101
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Component exposure vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Component exposure vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete List of Disallowed Inputs", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:17:44.624Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52101", "datePublished": "2024-01-16T09:17:44.624Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-08-02T22:48:12.446Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22316
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/2/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.517Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Attackers with physical access to the device can thereby exploit this vulnerability. A successful exploitation of this vulnerability can compromise the device\u0027s data security and functional availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Authentication for Critical Function", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T15:42:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22316", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Attackers with physical access to the device can thereby exploit this vulnerability. A successful exploitation of this vulnerability can compromise the device\u0027s data security and functional availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22316", "datePublished": "2021-06-03T15:42:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48510
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the AMS module. Successful exploitation of this vulnerability will cause unauthorized operations." } ], "value": "Input verification vulnerability in the AMS module. Successful exploitation of this vulnerability will cause unauthorized operations." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:39:00.248Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48510", "datePublished": "2023-07-06T12:39:00.248Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22371
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Permission Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T14:57:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Permission Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22371", "datePublished": "2021-06-30T14:57:55", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22335
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/4/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Improper Operation Limit vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause exceptions in image processing." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Improper Operation Limit Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T19:25:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Improper Operation Limit vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause exceptions in image processing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Improper Operation Limit Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22335", "datePublished": "2021-06-03T19:25:23", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.471Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52542
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52542", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T18:23:02.155930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-31T17:49:45.855Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the system module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the system module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:48:33.106Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52542", "datePublished": "2024-04-08T08:48:33.106Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-10-31T17:49:45.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41588
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.233Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The home screen module has a vulnerability in service logic processing.Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic exception vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41588", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48289
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48289", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22413
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" }, { "status": "affected", "version": "8.2" }, { "status": "affected", "version": "8.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:46:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22413", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" }, { "version_affected": "=", "version_value": "8.2" }, { "version_affected": "=", "version_value": "8.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22413", "datePublished": "2021-08-02T16:46:57", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22412
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random kernel address access." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:46:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22412", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random kernel address access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22412", "datePublished": "2021-08-02T16:46:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38985
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition module has a vulnerability in input validation.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Input verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38985", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22443
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random address access." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:58:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22443", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random address access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22443", "datePublished": "2021-08-02T16:58:41", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52539
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52539", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T16:16:28.000372Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-15T16:22:11.397Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the Settings module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission verification vulnerability in the Settings module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:45:14.929Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52539", "datePublished": "2024-04-08T08:45:14.929Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-15T16:22:11.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52719
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52719", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:52:33.414498Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:43.367Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:34.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the PMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Privilege escalation vulnerability in the PMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:58:21.254Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52719", "datePublished": "2024-05-11T09:58:21.254Z", "dateReserved": "2024-04-23T03:42:13.136Z", "dateUpdated": "2024-08-02T23:11:34.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34742
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Read/Write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Read/Write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34742", "datePublished": "2022-07-11T13:53:29", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44563
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a race condition vulnerability in SD upgrade mode. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44563", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48515
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of inappropriate permission control in Nearby. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of inappropriate permission control in Nearby. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:46:13.191Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48515", "datePublished": "2023-07-06T12:46:13.191Z", "dateReserved": "2023-06-29T11:23:50.333Z", "dateUpdated": "2024-08-03T15:17:54.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52713
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52713", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T19:42:49.196947Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-14T19:53:45.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission control in the window management module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "value": "Vulnerability of improper permission control in the window management module.\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T08:41:49.250Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52713", "datePublished": "2024-04-07T08:41:49.250Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-11-14T19:53:45.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38986
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HIPP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause out-of-bounds access to the HIPP module and page table tampering, affecting device confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38986", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22319
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22319", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22319", "datePublished": "2022-02-25T18:11:05", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37046
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability with the codec detection module", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37046", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability with the codec detection module" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37046", "datePublished": "2021-12-07T15:45:21", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46788
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations." } ], "problemTypes": [ { "descriptions": [ { "description": "Third-party pop-up window coverage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:02:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46788", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Third-party pop-up window coverage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46788", "datePublished": "2022-05-13T15:02:51", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46740
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:41.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46740", "datePublished": "2022-04-11T19:38:23", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:41.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36989
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Kernel crash vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Kernel crash vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Kernel crash vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Kernel crash vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36989", "datePublished": "2021-10-28T12:26:23", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31225
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:31.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Gallery app has the risk of hijacking attacks. Successful exploitation of this vulnerability may cause download failures and affect product availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-31225", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-02T14:53:31.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22352
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.517Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration Defect Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T20:23:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22352", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration Defect Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22352", "datePublished": "2021-06-30T20:23:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52537
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52537", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T13:58:46.739019Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-01T14:01:16.101Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package name verification being bypassed in the HwIms module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of package name verification being bypassed in the HwIms module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:40:37.167Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52537", "datePublished": "2024-04-08T08:40:37.167Z", "dateReserved": "2024-02-27T03:41:51.380Z", "dateUpdated": "2024-08-02T23:03:20.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46323
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have the out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46323", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38988
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38988", "datePublished": "2022-09-16T17:56:28", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39389
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39389", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:33:03.841704Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1285", "description": "CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:37:21.887Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "value": "Vulnerability of input parameters being not strictly verified in the PMS module. Successful exploitation of this vulnerability may cause home screen unavailability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:30:51.872Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39389", "datePublished": "2023-08-13T11:30:51.872Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:37:21.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44109
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.707Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:41:47.947Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44109", "datePublished": "2023-10-11T10:41:47.947Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-08-02T19:59:50.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40006
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eVulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality.\u003c/p\u003e" } ], "value": "Vulnerability of design defects in the security algorithm component. Successful exploitation of this vulnerability may affect confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-254", "description": "CWE-254 7PK - Security Features", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:50:52.820Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint module has a security risk of brute force cracking. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Security Features" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40006", "datePublished": "2022-01-07T22:39:30", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39670
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39670", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:54:55.648338Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T14:01:13.034Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the account synchronisation module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Privilege escalation vulnerability in the account synchronisation module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:45:24.377Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39670", "datePublished": "2024-07-25T11:45:24.377Z", "dateReserved": "2024-06-27T08:24:56.589Z", "dateUpdated": "2024-08-02T04:26:15.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38979
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.710Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38979", "datePublished": "2022-09-16T17:56:43", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37111
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leakage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leakage" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37111", "datePublished": "2022-01-03T21:07:27", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22255
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Common DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22255", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The application framework has a common DoS vulnerability.Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Common DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22255", "datePublished": "2022-04-11T19:38:20", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37053
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37053", "datePublished": "2021-12-08T14:12:34", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22261
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:03:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22261", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22261", "datePublished": "2022-05-13T15:03:44", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22370
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Credentials Management Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T13:49:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22370", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0" }, { "version_value": "Magic UI 4.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Credentials Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22370", "datePublished": "2021-06-30T13:49:33", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9138
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2020/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based buffer overflow vulnerability in some Huawei Smartphone, Successful exploit of this vulnerability can cause process exceptions during updating." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-13T22:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "version_value": "Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based buffer overflow vulnerability in some Huawei Smartphone, Successful exploit of this vulnerability can cause process exceptions during updating." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2020/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9138", "datePublished": "2021-01-13T22:00:00", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41306
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41306", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:49:09.768594Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:49:21.601Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable." } ], "value": "Vulnerability of mutex management in the bone voice ID trusted application (TA) module. Successful exploitation of this vulnerability may cause the bone voice ID feature to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:14:26.222Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41306", "datePublished": "2023-09-26T01:14:26.222Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T18:49:21.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48492
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48492", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:55.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5464
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5464", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-18T15:30:32.565891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-18T15:39:14.019Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:11:12.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insufficient permission verification in the NearLink module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of insufficient permission verification in the NearLink module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:29:51.982Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-5464", "datePublished": "2024-06-14T07:29:51.982Z", "dateReserved": "2024-05-29T07:57:39.735Z", "dateUpdated": "2024-08-01T21:11:12.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36503
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36503", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T13:39:26.960168Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T13:39:52.624Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory management vulnerability in the Gralloc module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Memory management vulnerability in the Gralloc module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-908", "description": "CWE-908 Use of Uninitialized Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:25:07.573Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36503", "datePublished": "2024-06-14T07:25:07.573Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.278Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52097
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52097", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T16:42:48.264903Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T21:03:20.579Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:54:08.330Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52097", "datePublished": "2024-02-18T02:54:08.330Z", "dateReserved": "2023-12-27T02:33:15.059Z", "dateUpdated": "2024-11-12T21:03:20.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46867
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.738Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46867", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-04T05:17:42.738Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42034
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42034", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T13:08:42.401805Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T13:09:16.945Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "LaunchAnywhere vulnerability in the account module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "LaunchAnywhere vulnerability in the account module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:23:38.895Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42034", "datePublished": "2024-08-08T09:23:38.895Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T13:09:16.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48359
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.865Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The recovery mode for updates has a vulnerability that causes arbitrary disk modification. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary disk modification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48359", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22431
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuring permission isolation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22431", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuring permission isolation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22431", "datePublished": "2022-02-25T18:11:09", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46890
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T11:52:24.005Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46890", "datePublished": "2023-07-05T11:52:24.005Z", "dateReserved": "2023-06-29T11:27:53.896Z", "dateUpdated": "2024-08-04T05:17:42.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40047
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Release of Resource after Effective Lifetime", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:51:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Release of Resource after Effective Lifetime" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40047", "datePublished": "2022-03-07T13:51:07", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26547
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:54.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The InputMethod module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-26547", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-02T11:53:54.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40031
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40031", "datePublished": "2022-01-07T22:39:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38992
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38992", "datePublished": "2022-09-16T17:56:55", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44114
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.830Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44114", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:04:31.739616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:05:06.617Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds array vulnerability in the dataipa module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Out-of-bounds array vulnerability in the dataipa module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:00:14.247Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44114", "datePublished": "2023-10-11T12:00:14.247Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-18T15:05:06.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5801
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:14:24.025Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5801", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:59:47.994949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T15:00:19.886Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "value": "Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:48:14.529Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-5801", "datePublished": "2023-11-08T02:48:14.529Z", "dateReserved": "2023-10-26T11:33:07.080Z", "dateUpdated": "2024-09-04T15:00:19.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48300
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.750Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48300", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.750Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52369
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52369", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T18:52:30.707849Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:34.080Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Stack overflow vulnerability in the NFC module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "value": "Stack overflow vulnerability in the NFC module.Successful exploitation of this vulnerability may affect service availability and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:39:56.203Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52369", "datePublished": "2024-02-18T03:39:56.203Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34743
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34743", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34743", "datePublished": "2022-07-11T13:53:04", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45449
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45449", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:07:40.451445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:07:58.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the ringtone setting module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the ringtone setting module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:21:12.057Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45449", "datePublished": "2024-09-04T02:21:12.057Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:07:58.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22384
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.275Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:41:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22384", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22384", "datePublished": "2021-08-02T16:41:53", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37021
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Stack-based Buffer Overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37021", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37021", "datePublished": "2021-12-07T16:02:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48517
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.513Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized service access vulnerability in the DSoftBus module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Unauthorized service access vulnerability in the DSoftBus module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:48:51.135Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48517", "datePublished": "2023-07-06T12:48:51.135Z", "dateReserved": "2023-06-29T11:23:50.334Z", "dateUpdated": "2024-08-03T15:17:54.513Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:24:07.748Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52116", "datePublished": "2024-01-16T08:24:07.748Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39394
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39394", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T13:48:29.702173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T13:49:18.573Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of API privilege escalation in the wifienhance module. Successful exploitation of this vulnerability may cause the arp list to be modified." } ], "value": "Vulnerability of API privilege escalation in the wifienhance module. Successful exploitation of this vulnerability may cause the arp list to be modified." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:26:40.032Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39394", "datePublished": "2023-08-13T12:26:40.032Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-10T13:49:18.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46836
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Information leakage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46836", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information leakage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46836", "datePublished": "2022-09-16T17:55:42", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-04T05:17:42.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34167
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Vulnerability of spoofing trustlists of Huawei desktop", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34167", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39403
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39403", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:16.944928Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:30:27.036Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358 Improperly Implemented Security Check for Standard", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:40:18.157Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39403", "datePublished": "2023-08-13T12:40:18.157Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:30:27.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51527
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51527", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:47.882951Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:52:48.790Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the Gallery app\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the Gallery app\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T09:25:27.127Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51527", "datePublished": "2024-11-05T09:25:27.127Z", "dateReserved": "2024-10-29T01:43:54.526Z", "dateUpdated": "2024-11-05T14:52:48.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41310
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41310", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T18:48:13.867695Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:48:23.529Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background." } ], "value": "Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:20:44.416Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41310", "datePublished": "2023-09-26T01:20:44.416Z", "dateReserved": "2023-08-28T12:17:09.167Z", "dateUpdated": "2024-09-24T18:48:23.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46767
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46767", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:27:13.516034Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:28:35.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:27:46.514Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46767", "datePublished": "2023-11-08T09:27:46.514Z", "dateReserved": "2023-10-26T11:33:04.518Z", "dateUpdated": "2024-09-04T19:28:35.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37115
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized rewriting vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37115", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized rewriting vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37115", "datePublished": "2022-02-09T22:03:50", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52545
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:21.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52545", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:11:24.279500Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-26T16:51:53.780Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of undefined permissions in the Calendar app.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of undefined permissions in the Calendar app.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:53:09.751Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52545", "datePublished": "2024-04-08T08:53:09.751Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-26T16:51:53.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34741
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34741", "datePublished": "2022-07-11T13:53:17", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52107
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52107", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T14:35:55.614449Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T14:36:28.905Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permissions being not strictly verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of permissions being not strictly verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:25:30.312Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52107", "datePublished": "2024-01-16T08:25:30.312Z", "dateReserved": "2023-12-27T02:33:17.231Z", "dateUpdated": "2024-08-29T14:36:28.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22349
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of insufficient input verification may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T20:37:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22349", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of insufficient input verification may cause the system to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22349", "datePublished": "2021-06-30T20:37:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36988
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36988", "datePublished": "2021-10-28T12:26:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52717
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52717", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T19:17:39.146898Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:48.930Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:11:35.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the lock screen module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the lock screen module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-07T09:03:06.815Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52717", "datePublished": "2024-04-07T09:03:06.815Z", "dateReserved": "2024-03-27T03:37:42.326Z", "dateUpdated": "2024-08-02T23:11:35.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22387
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Control of Dynamically Managing Code Resources", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:42:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22387", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Control of Dynamically Managing Code Resources" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22387", "datePublished": "2021-08-02T16:42:51", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40009", "datePublished": "2022-01-07T22:39:33", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48497
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48497", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48613
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-48613", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:08:52.581746Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:10:17.357Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the kernel module. Successful exploitation of this vulnerability may cause variable values to be read with the condition evaluation bypassed." } ], "value": "Race condition vulnerability in the kernel module. Successful exploitation of this vulnerability may cause variable values to be read with the condition evaluation bypassed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:08:56.211Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48613", "datePublished": "2023-11-08T09:08:56.211Z", "dateReserved": "2023-10-26T12:17:08.302Z", "dateUpdated": "2024-09-04T19:10:17.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40026
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40026", "datePublished": "2022-01-07T22:39:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48360
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The facial recognition module has a vulnerability in file permission control. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48360", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37103
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission management vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission management vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37103", "datePublished": "2022-02-25T18:11:13", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37239
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Format string vulnerability in the distributed file system. Attackers who bypass the selinux permission can exploit this vulnerability to crash the program." } ], "value": "Format string vulnerability in the distributed file system. Attackers who bypass the selinux permission can exploit this vulnerability to crash the program." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:27:38.720Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37239", "datePublished": "2023-07-06T12:27:38.720Z", "dateReserved": "2023-06-29T10:23:01.713Z", "dateUpdated": "2024-08-02T17:09:34.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45443
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45443", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:34:30.256008Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:34:39.560Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Directory traversal vulnerability in the cust module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "value": "Directory traversal vulnerability in the cust module\nImpact: Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:49:51.125Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45443", "datePublished": "2024-09-04T01:49:51.125Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:34:39.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52363
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52363", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-15T20:26:49.124607Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:56.428Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the Control Panel module.Successful exploitation of this vulnerability may cause app processes to be started by mistake." } ], "value": "Vulnerability of defects introduced in the design process in the Control Panel module.Successful exploitation of this vulnerability may cause app processes to be started by mistake." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:02:13.754Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52363", "datePublished": "2024-02-18T03:02:13.754Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-08-02T22:55:41.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44546
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the vulnerability that the mapping is not cleared after the memory is automatically released. Successful exploitation of this vulnerability may cause a system restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Update of Reference Count", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44546", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37052
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Exception log vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exception log vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37052", "datePublished": "2021-12-08T14:12:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.743Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36996
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36996", "datePublished": "2021-10-28T12:27:13", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22367
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to authentication bypass." } ], "problemTypes": [ { "descriptions": [ { "description": "Key Management Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T17:29:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22367", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to authentication bypass." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Key Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22367", "datePublished": "2021-06-30T17:29:39", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40054
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.517Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer underflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer underflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40054", "datePublished": "2022-03-07T13:50:21", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40052
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect buffer size calculation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect buffer size calculation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40052", "datePublished": "2022-03-07T13:50:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39000
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup." } ], "problemTypes": [ { "descriptions": [ { "description": "Malicious app control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Malicious app control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39000", "datePublished": "2022-09-16T17:55:46", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39387
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.428Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39387", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:01:25.944023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:02:20.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission control in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "value": "Vulnerability of permission control in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:22:52.628Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39387", "datePublished": "2023-08-13T12:22:52.628Z", "dateReserved": "2023-07-31T04:41:32.211Z", "dateUpdated": "2024-10-10T14:02:20.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40027
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.425Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T13:02:50.922Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40027", "datePublished": "2022-01-07T22:39:45", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39397
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39397", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:05:03.456139Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:45:56.634Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input parameter verification vulnerability in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "value": "Input parameter verification vulnerability in the communication system. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:32:43.081Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39397", "datePublished": "2023-08-13T12:32:43.081Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:45:56.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51529
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51529", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:33.594311Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:51:53.664Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Data verification vulnerability in the battery module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect function stability." } ], "value": "Data verification vulnerability in the battery module\nImpact: Successful exploitation of this vulnerability may affect function stability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T11:18:31.133Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51529", "datePublished": "2024-11-05T11:18:31.133Z", "dateReserved": "2024-10-29T01:43:54.527Z", "dateUpdated": "2024-11-05T14:51:53.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44547
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Display Service module has a UAF vulnerability. Successful exploitation of this vulnerability may affect the display service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44547", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41586
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication framework module has a vulnerability of not truncating data properly.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Untruncated data vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41586", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46840
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verification.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46840", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9143
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2020/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Authentication for Critical Function", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-13T21:52:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9143", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0" }, { "version_value": "Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2020/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9143", "datePublished": "2021-01-13T21:52:21", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52546
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52546", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T15:06:54.177202Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:38.995Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:21.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package name verification being bypassed in the Calendar app.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of package name verification being bypassed in the Calendar app.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:54:05.956Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52546", "datePublished": "2024-04-08T08:54:05.956Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-08-02T23:03:21.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31226
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:30.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SDK for the MediaPlaybackController module has improper permission verification. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-31226", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-02T14:53:30.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37045
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37045", "datePublished": "2021-12-08T14:12:07", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46883
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46883", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47974
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth AVRCP module has a vulnerability that can lead to DoS attacks.Successful exploitation of this vulnerability may cause the Bluetooth process to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS attack vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-47974", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-03T15:02:36.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48296
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI has a vulnerability in permission management. Successful exploitation of this vulnerability may cause users to receive broadcasts from malicious apps, conveying false alarm information about external storage devices." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission management vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48296", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37075
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Credentials Management Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Credentials Management Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37075", "datePublished": "2021-12-08T14:13:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37027
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37027", "datePublished": "2022-02-25T18:11:04", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Invalid address access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Invalid address access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37037", "datePublished": "2021-12-08T14:11:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40011
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled resource consumption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T14:05:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 12.0.0,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0,EMUI 10.0.0,EMUI 9.1.1,EMUI 9.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0,Magic UI 3.0.0,Magic UI 2.1.1" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled resource consumption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40011", "datePublished": "2022-01-07T22:39:31", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52543
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52543", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T19:39:59.047820Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T16:03:30.857Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.786Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the system module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the system module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:49:44.807Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52543", "datePublished": "2024-04-08T08:49:44.807Z", "dateReserved": "2024-02-27T03:41:51.381Z", "dateUpdated": "2024-11-07T16:03:30.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36499
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36499", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T16:18:23.453375Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T16:18:31.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized screenshot capturing in the WMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of unauthorized screenshot capturing in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:17:27.308Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36499", "datePublished": "2024-06-14T07:17:27.308Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46762
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The memory management module has a logic bypass vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46762", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-07T00:00:00", "dateUpdated": "2024-08-03T14:39:38.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44106
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44106", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:11:11.666352Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:15:30.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:55:10.352Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44106", "datePublished": "2023-10-11T11:55:10.352Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:15:30.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37240
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nVulnerability of missing input length verification in the distributed file system. Successful exploitation of this vulnerability may cause out-of-bounds read.\n\n" } ], "value": "\nVulnerability of missing input length verification in the distributed file system. Successful exploitation of this vulnerability may cause out-of-bounds read.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:29:12.863Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37240", "datePublished": "2023-07-06T12:29:12.863Z", "dateReserved": "2023-06-29T10:23:01.713Z", "dateUpdated": "2024-08-02T17:09:34.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46787
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:02:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46787", "datePublished": "2022-05-13T15:02:34", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22488
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22488", "datePublished": "2021-10-28T12:25:17", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44102
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44102", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:24:00.309066Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:24:20.522Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability can cause the Bluetooth function to be unavailable." } ], "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability can cause the Bluetooth function to be unavailable." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:50:20.615Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44102", "datePublished": "2023-10-11T11:50:20.615Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:24:20.522Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22405
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.220Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22405", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22405", "datePublished": "2021-10-28T12:22:03", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32996
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32996", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:48:50.532409Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:49:53.728Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the account module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Privilege escalation vulnerability in the account module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:02:22.311Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32996", "datePublished": "2024-05-11T10:02:22.311Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40016
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40016", "datePublished": "2022-07-11T13:53:57", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44093
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44093", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:54:16.763490Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:54:59.613Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of package names\u0027 public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of package names\u0027 public keys not being verified in the security module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Critical Step in Authentication", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T10:36:21.500Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44093", "datePublished": "2023-10-11T10:36:21.500Z", "dateReserved": "2023-09-25T09:11:04.623Z", "dateUpdated": "2024-09-18T15:54:59.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46772
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46772", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:02:26.176545Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:08:34.413Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters being out of the value range in the QMI service module. Successful exploitation of this vulnerability may cause errors in reading file data." } ], "value": "Vulnerability of parameters being out of the value range in the QMI service module. Successful exploitation of this vulnerability may cause errors in reading file data." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:06:45.198Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46772", "datePublished": "2023-11-08T09:06:45.198Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:08:34.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39393
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39393", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:29:25.730418Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:30:08.867Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of insecure signatures in the ServiceWifiResources module. Successful exploitation of this vulnerability may cause ServiceWifiResources to be maliciously modified and overwritten." } ], "value": "Vulnerability of insecure signatures in the ServiceWifiResources module. Successful exploitation of this vulnerability may cause ServiceWifiResources to be maliciously modified and overwritten." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:34:33.081Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39393", "datePublished": "2023-08-13T11:34:33.081Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-10T14:30:08.867Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48487
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Defined With Unsafe Actions", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48487", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41587
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncaptured exceptions in the home screen module. Successful exploitation of this vulnerability may affect stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41587", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36993
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory leaks vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leaks", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory leaks vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leaks" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36993", "datePublished": "2021-10-28T12:26:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37039
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.540Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Input verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37039", "datePublished": "2021-12-08T14:11:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46763
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46763", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:53:04.488901Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:55:04.015Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of background app permission management in the framework module. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "value": "Vulnerability of background app permission management in the framework module. Successful exploitation of this vulnerability may cause background apps to start maliciously." } ], "problemTypes": [ { "descriptions": [ { "description": "Data Processing Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:33:20.439Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46763", "datePublished": "2023-11-08T09:33:20.439Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T14:55:04.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52551
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52551", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-09T17:20:22.094222Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-01T18:41:43.394Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of data verification errors in the kernel module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:57:32.246Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52551", "datePublished": "2024-04-08T08:57:32.246Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-11-01T18:41:43.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39408
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39408", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:20:43.725122Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:21:17.517Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T08:51:09.991Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39408", "datePublished": "2023-09-25T08:51:09.991Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-09-24T14:21:17.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46318
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings." } ], "problemTypes": [ { "descriptions": [ { "description": "Function logic error vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46318", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42039
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42039", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:32:04.070540Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:32:13.990Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the SystemUI module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the SystemUI module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:35:23.145Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42039", "datePublished": "2024-09-04T01:35:23.145Z", "dateReserved": "2024-07-27T06:52:58.402Z", "dateUpdated": "2024-09-04T13:32:13.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49242
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Free broadcast vulnerability in the running management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Free broadcast vulnerability in the running management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:49:41.628Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49242", "datePublished": "2023-12-06T08:49:41.628Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45441
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45441", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:27:38.331736Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:27:47.004Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the system service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Input verification vulnerability in the system service module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:37:25.340Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45441", "datePublished": "2024-09-04T01:37:25.340Z", "dateReserved": "2024-08-29T06:19:14.881Z", "dateUpdated": "2024-09-04T13:27:47.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34161
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34161", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40058
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.574Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40058", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40058", "datePublished": "2022-03-07T13:49:59", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26548
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:53:53.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The pgmng module has a vulnerability in serialization/deserialization. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-26548", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-02T11:53:53.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52386
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52386", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T12:50:05.968405Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:33.674Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the RSMC module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds write vulnerability in the RSMC module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Length Parameter Inconsistency", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:19:57.110Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52386", "datePublished": "2024-04-08T09:19:57.110Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-08-02T22:55:41.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38978
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38978", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38978", "datePublished": "2022-09-16T17:56:37", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22474
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds memory access in Huawei Smartphone.Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:24:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22474", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds memory access in Huawei Smartphone.Successful exploitation of this vulnerability may cause process exceptions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22474", "datePublished": "2021-10-28T12:24:32", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46773
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the PMS module. Successful exploitation of this vulnerability may cause privilege escalation." } ], "value": "Permission management vulnerability in the PMS module. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:31:12.555Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46773", "datePublished": "2023-12-06T08:31:12.555Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-08-02T20:53:21.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48312
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The HwPCAssistant module has the out-of-bounds read/write vulnerability. Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "value": "The HwPCAssistant module has the out-of-bounds read/write vulnerability. Successful exploitation of this vulnerability may affect confidentiality and integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "out-of-bounds read/write vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-16T06:01:46.922Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48312", "datePublished": "2023-04-16T06:01:46.922Z", "dateReserved": "2023-02-06T03:32:29.062Z", "dateUpdated": "2024-08-03T15:10:59.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52359
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52359", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-08T12:51:19.654353Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:58.620Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification in some APIs in the ActivityTaskManagerService module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of permission verification in some APIs in the ActivityTaskManagerService module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:51:03.625Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52359", "datePublished": "2024-04-08T08:51:03.625Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-08-02T22:55:41.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38987
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38987", "datePublished": "2022-09-16T17:55:59", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29792
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.572Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Serial number obtaining vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:04:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29792", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chip component has a vulnerability of disclosing CPU SNs.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Serial number obtaining vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29792", "datePublished": "2022-05-13T15:04:46", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22404
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Directory traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22404", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Directory traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22404", "datePublished": "2021-10-28T12:21:54", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42035
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42035", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-08T12:54:40.486843Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-08T12:57:08.400Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the App Multiplier module\u003cbr\u003eImpact:Successful exploitation of this vulnerability may affect functionality and confidentiality." } ], "value": "Permission control vulnerability in the App Multiplier module\nImpact:Successful exploitation of this vulnerability may affect functionality and confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:26:10.805Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42035", "datePublished": "2024-08-08T09:26:10.805Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-08T12:57:08.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1695
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:51:58.425Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1695", "datePublished": "2023-07-06T12:51:58.425Z", "dateReserved": "2023-03-29T09:29:53.740Z", "dateUpdated": "2024-08-02T05:57:25.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46851
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46851", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-04T05:17:42.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31763
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:00.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds array vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31763", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has the null pointer and out-of-bounds array vulnerabilities. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds array vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31763", "datePublished": "2022-06-13T14:55:11", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:00.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32993
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32993", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:49:49.403661Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:35.296Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the memory module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds access vulnerability in the memory module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:56:03.872Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32993", "datePublished": "2024-05-11T09:56:03.872Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38993
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38993", "datePublished": "2022-09-16T17:55:53", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46761
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.968Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system has a vulnerability that may cause dynamic hiding and restoring of app icons.Successful exploitation of this vulnerability may cause malicious hiding of app icons." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46761", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-07T00:00:00", "dateUpdated": "2024-08-03T14:39:38.968Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3456
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:34:21.446Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-3456", "datePublished": "2023-07-06T12:34:21.446Z", "dateReserved": "2023-06-29T11:13:39.706Z", "dateUpdated": "2024-08-02T06:55:03.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46770
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.867Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46770", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:00:09.547396Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:00:14.137Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds vulnerability in the sensor module. Successful exploitation of this vulnerability may cause mistouch prevention errors on users\u0027 mobile phones." } ], "value": "Out-of-bounds vulnerability in the sensor module. Successful exploitation of this vulnerability may cause mistouch prevention errors on users\u0027 mobile phones." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Length Parameter Inconsistency", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T02:53:45.996Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46770", "datePublished": "2023-11-08T02:53:45.996Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:00:14.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41299
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.074Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41299", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T16:01:53.745952Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T16:02:14.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T11:41:44.258Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41299", "datePublished": "2023-09-25T11:41:44.258Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T16:02:14.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36500
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36500", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T19:48:38.560023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T19:53:09.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.311Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Privilege escalation vulnerability in the AMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Privilege escalation vulnerability in the AMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:19:31.788Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36500", "datePublished": "2024-06-14T07:19:31.788Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.311Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39011
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.256Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HISP module has a vulnerability of bypassing the check of the data transferred in the kernel space.Successful exploitation of this vulnerability may cause unauthorized access to the HISP module." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39011", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-36601
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:30:08.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:58:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-36601", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-36601", "datePublished": "2022-09-16T17:58:12", "dateReserved": "2022-08-24T00:00:00", "dateUpdated": "2024-08-04T17:30:08.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37238
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of apps\u0027 permission to access a certain API being incompletely verified in the wireless projection module. Successful exploitation of this vulnerability may affect some wireless projection features." } ], "value": "Vulnerability of apps\u0027 permission to access a certain API being incompletely verified in the wireless projection module. Successful exploitation of this vulnerability may affect some wireless projection features." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:26:28.737Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37238", "datePublished": "2023-07-06T12:26:28.737Z", "dateReserved": "2023-06-29T10:23:01.713Z", "dateUpdated": "2024-08-02T17:09:33.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36502
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36502", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T15:31:40.711811Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:31:48.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the audio module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Out-of-bounds read vulnerability in the audio module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:23:20.096Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36502", "datePublished": "2024-06-14T07:23:20.096Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37031
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:15:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37031", "datePublished": "2021-11-23T15:15:05", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52373
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52373", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T15:20:36.325399Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:20:57.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of permission verification in the content sharing pop-up module.Successful exploitation of this vulnerability may cause unauthorized file sharing." } ], "value": "Vulnerability of permission verification in the content sharing pop-up module.Successful exploitation of this vulnerability may cause unauthorized file sharing." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:52:33.681Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52373", "datePublished": "2024-02-18T03:52:33.681Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41309
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41309", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T17:44:57.062682Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T17:45:08.287Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission control vulnerability in the MediaPlaybackController module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:19:07.089Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41309", "datePublished": "2023-09-26T01:19:07.089Z", "dateReserved": "2023-08-28T12:17:09.166Z", "dateUpdated": "2024-09-24T17:45:08.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46891
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.840Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "value": "Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T12:15:51.878Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46891", "datePublished": "2023-07-05T12:15:51.878Z", "dateReserved": "2023-06-29T11:27:53.896Z", "dateUpdated": "2024-08-04T05:17:42.840Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48519
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Unauthorized access vulnerability in the SystemUI module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:54:22.659Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48519", "datePublished": "2023-07-06T12:54:22.659Z", "dateReserved": "2023-06-29T11:23:50.334Z", "dateUpdated": "2024-08-03T15:17:55.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9144
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2020/12/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "EMUI 10.1.1" }, { "status": "affected", "version": "EMUI 10.1.0" }, { "status": "affected", "version": "EMUI 10.0.0" }, { "status": "affected", "version": "EMUI 9.1.1" }, { "status": "affected", "version": "EMUI 9.1.0" } ] }, { "product": "Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Magic UI 4.0.0" }, { "status": "affected", "version": "Magic UI 3.1.1" }, { "status": "affected", "version": "Magic UI 3.1.0" }, { "status": "affected", "version": "Magic UI 3.0.0" }, { "status": "affected", "version": "Magic UI 2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap overflow vulnerability in some Huawei smartphone, attackers can exploit this vulnerability to cause heap overflows due to improper restriction of operations within the bounds of a memory buffer." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-13T18:53:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9144", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0" }, { "version_value": "EMUI 10.1.1" }, { "version_value": "EMUI 10.1.0" }, { "version_value": "EMUI 10.0.0" }, { "version_value": "EMUI 9.1.1" }, { "version_value": "EMUI 9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_value": "Magic UI 4.0.0" }, { "version_value": "Magic UI 3.1.1" }, { "version_value": "Magic UI 3.1.0" }, { "version_value": "Magic UI 3.0.0" }, { "version_value": "Magic UI 2.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap overflow vulnerability in some Huawei smartphone, attackers can exploit this vulnerability to cause heap overflows due to improper restriction of operations within the bounds of a memory buffer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2020/12/", "refsource": "CONFIRM", "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9144", "datePublished": "2021-01-13T18:53:04", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46892
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:43.023Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Encryption bypass vulnerability in Maintenance mode. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Encryption bypass vulnerability in Maintenance mode. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:41:21.742Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46892", "datePublished": "2023-07-06T12:41:21.742Z", "dateReserved": "2023-06-29T11:27:53.896Z", "dateUpdated": "2024-08-04T05:17:43.023Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40034
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory overwriting vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory overwriting vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40034", "datePublished": "2022-08-09T20:10:14", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39391
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39391", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T13:53:56.356852Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T13:54:41.514Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of system file information leakage in the USB Service module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Vulnerability of system file information leakage in the USB Service module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:25:22.970Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39391", "datePublished": "2023-08-13T12:25:22.970Z", "dateReserved": "2023-07-31T04:41:36.391Z", "dateUpdated": "2024-10-10T13:54:41.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40013
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40013", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40013", "datePublished": "2022-07-11T13:53:52", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32989
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32989", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:51:23.325172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:24.753Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient verification vulnerability in the system sharing pop-up module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Insufficient verification vulnerability in the system sharing pop-up module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:38:14.085Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32989", "datePublished": "2024-05-11T09:42:32.952Z", "dateReserved": "2024-04-23T03:44:12.572Z", "dateUpdated": "2024-08-02T02:27:53.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40062
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Copy without Checking Size of Input", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40062", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Copy without Checking Size of Input" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40062", "datePublished": "2022-03-07T13:49:31", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42030
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42030", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T17:50:14.258398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T17:50:23.235Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the content sharing pop-up module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the content sharing pop-up module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T08:13:26.981Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42030", "datePublished": "2024-08-08T08:13:26.981Z", "dateReserved": "2024-07-27T06:52:58.400Z", "dateUpdated": "2024-08-09T17:50:23.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34164
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of incomplete input parameter verification in the communication framework module. Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of incomplete input parameter verification in the communication framework module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:35:19.114Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34164", "datePublished": "2023-07-06T12:35:19.114Z", "dateReserved": "2023-05-29T09:03:29.119Z", "dateUpdated": "2024-08-02T16:01:54.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46327
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have configuration issues. Successful exploitation of this vulnerability may cause privilege escalation, which results in system service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration issues", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46327", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45450
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45450", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:32:39.711690Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:32:51.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the software update module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the software update module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:15:38.783Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45450", "datePublished": "2024-09-04T01:15:26.814Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:32:51.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46774
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.328Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-46774", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:14:01.196769Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:19:38.453Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "value": "Vulnerability of uncaught exceptions in the NFC module. Successful exploitation of this vulnerability can affect NFC availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:12:36.859Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46774", "datePublished": "2023-11-08T09:12:36.859Z", "dateReserved": "2023-10-26T11:33:04.519Z", "dateUpdated": "2024-09-04T19:19:38.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps." } ], "problemTypes": [ { "descriptions": [ { "description": "Bundle serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that are accessible only to system apps." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Bundle serialization/deserialization mismatch vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39008", "datePublished": "2022-09-16T17:55:34", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44550
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The graphics display module has a UAF vulnerability when traversing graphic layers. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44550", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47290
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47290", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T16:06:55.706553Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T16:07:05.266Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input validation vulnerability in the USB service module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Input validation vulnerability in the USB service module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:15:05.972Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47290", "datePublished": "2024-09-27T10:15:05.972Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T16:07:05.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46756
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46756", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:35:06.375650Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:40:08.537Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "value": "Permission control vulnerability in the window management module. Successful exploitation of this vulnerability may cause malicious pop-up windows." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:12:50.853Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46756", "datePublished": "2023-11-08T10:12:50.853Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:40:08.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5465
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5465", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T15:39:16.404798Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T15:39:41.731Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:11:12.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Function vulnerabilities in the Calendar module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Function vulnerabilities in the Calendar module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:30:57.462Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-5465", "datePublished": "2024-06-14T07:30:57.462Z", "dateReserved": "2024-05-29T07:57:46.652Z", "dateUpdated": "2024-08-01T21:11:12.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52368
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52368", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T16:55:19.882384Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:22:55.170Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Input verification vulnerability in the account module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Input verification vulnerability in the account module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:38:36.700Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52368", "datePublished": "2024-02-18T03:38:36.700Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37056
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.866Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37056", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37056", "datePublished": "2021-12-07T15:45:37", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22345
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI, Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI, Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1" }, { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0" }, { "status": "affected", "version": "Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds memory write." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T21:06:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22345", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI, Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1" }, { "version_value": "EMUI 11.0.0" }, { "version_value": "EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0" }, { "version_value": "Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds memory write." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22345", "datePublished": "2021-06-30T21:06:08", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37109
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a security protection bypass vulnerability with the modem.Successful exploitation of this vulnerability may cause memory protection failure." } ], "problemTypes": [ { "descriptions": [ { "description": "Security protection bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37109", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a security protection bypass vulnerability with the modem.Successful exploitation of this vulnerability may cause memory protection failure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Security protection bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37109", "datePublished": "2022-02-09T22:03:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44562
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44562", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37055
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.746Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37055", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logic bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37055", "datePublished": "2021-12-07T15:45:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31755
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission preservation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31755", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission preservation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31755", "datePublished": "2022-06-13T14:56:09", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48501
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48501", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9141
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2020/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.072Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.1.1, EMUI 10.1.0" }, { "status": "affected", "version": "Magic UI 3.1.1, Magic UI 3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a improper privilege management vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability can cause information disclosure and malfunctions due to insufficient verification of data authenticity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Privilege Management", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-13T21:53:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9141", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 10.1.1, EMUI 10.1.0" }, { "version_value": "Magic UI 3.1.1, Magic UI 3.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a improper privilege management vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability can cause information disclosure and malfunctions due to insufficient verification of data authenticity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2020/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9141", "datePublished": "2021-01-13T21:53:48", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.072Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22433
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22433", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22433", "datePublished": "2022-02-25T18:11:08", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52365
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52365", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-19T20:33:11.393487Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:20:56.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Out-of-bounds read vulnerability in the smart activity recognition module.Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:04:26.472Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52365", "datePublished": "2024-02-18T03:04:26.472Z", "dateReserved": "2024-01-26T06:51:31.234Z", "dateUpdated": "2024-08-02T22:55:41.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41301
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41301", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:17:17.994354Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:20:11.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Vulnerability of unauthorized API access in the PMS module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:08:30.160Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41301", "datePublished": "2023-09-25T12:08:30.160Z", "dateReserved": "2023-08-28T12:17:07.354Z", "dateUpdated": "2024-09-24T15:20:11.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9149
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/cn/support/bulletin/2021/1 | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-01T17:55:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9149", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0" }, { "version_value": "Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/cn/support/bulletin/2021/1", "refsource": "MISC", "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9149", "datePublished": "2021-04-01T17:55:04", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.001Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46761
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-46761", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:32:45.783465Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:34:26.787Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "value": "Out-of-bounds write vulnerability in the kernel driver module. Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T09:31:00.389Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46761", "datePublished": "2023-11-08T09:31:00.389Z", "dateReserved": "2023-10-26T11:32:55.337Z", "dateUpdated": "2024-09-04T19:34:26.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46868
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a problem in releasing memory.Successful exploitation of this vulnerability may result in out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46868", "datePublished": "2023-01-06T00:00:00", "dateReserved": "2022-12-28T00:00:00", "dateUpdated": "2024-08-04T05:17:42.806Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31756
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Design defects vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31756", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Design defects vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31756", "datePublished": "2022-06-13T14:55:54", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44104
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44104", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:16:41.136828Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:17:04.450Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:52:52.971Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44104", "datePublished": "2023-10-11T11:52:52.971Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:17:04.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37044
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37044", "datePublished": "2021-12-08T14:12:01", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.792Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38997
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38997", "datePublished": "2022-09-16T17:57:08", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49243
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of unauthorized access to email attachments in the email module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:56:24.442Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49243", "datePublished": "2023-12-06T08:56:24.442Z", "dateReserved": "2023-11-24T07:33:47.175Z", "dateUpdated": "2024-08-02T21:53:44.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34155
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "unspecified" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "unspecified" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of unauthorized calling on HUAWEI phones and tablets.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34155", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48354
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.866Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has a heap out-of-bounds write vulnerability. Successful exploitation of this vulnerability can cause the Bluetooth process to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48354", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40055
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Man-in-the-middle attack vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40055", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Man-in-the-middle attack vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40055", "datePublished": "2022-03-07T13:50:15", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41598
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41598", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49240
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.836Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the launcher module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the launcher module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:06:04.495Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49240", "datePublished": "2023-12-06T09:06:04.495Z", "dateReserved": "2023-11-24T07:33:47.174Z", "dateUpdated": "2024-08-02T21:53:44.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52108
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of process priorities being raised in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "value": "Vulnerability of process priorities being raised in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Business Logic Errors", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:43:08.695Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52108", "datePublished": "2024-01-16T08:43:08.695Z", "dateReserved": "2023-12-27T02:33:17.231Z", "dateUpdated": "2024-08-02T22:48:12.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40039
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40039", "datePublished": "2022-01-07T22:39:39", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34740
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.234Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34740", "datePublished": "2022-07-11T13:53:10", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.234Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41589
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.200Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX unwind stack module of the ArkCompiler has a vulnerability in interface calling.Successful exploitation of this vulnerability affects system services and device availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Interface misuse vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41589", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22258
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | HarmonyOS;EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.176Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS;EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "HarmonyOS 2.0" }, { "status": "affected", "version": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Event notification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:15:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22258", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { "version_value": "HarmonyOS 2.0" }, { "version_value": "EMUI 12.0.0,EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1,EMUI 10.1.0" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1,Magic UI 3.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Event notification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22258", "datePublished": "2022-04-11T19:38:18", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36986
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36986", "datePublished": "2021-10-28T12:25:45", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22435
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.945Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration Defect Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:54:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration Defect Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22435", "datePublished": "2021-08-02T16:54:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41591
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41591", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44103
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44103", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:18:58.134949Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:19:26.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds read vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Out-of-bounds read vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:51:36.547Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44103", "datePublished": "2023-10-11T11:51:36.547Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:19:26.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46312
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:46.668Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The application management module has a vulnerability in permission verification. Successful exploitation of this vulnerability causes unexpected clear of device applications." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46312", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:46.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46789
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.682Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.0.0, EMUI 10.1.0, EMUI 10.1.1, EMUI 11.0.1, EMUI 12.0.0" }, { "status": "affected", "version": "Magic UI 3.0.0, Magic UI 3.1.0, Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability can affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defectsl vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:58:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 10.0.0, EMUI 10.1.0, EMUI 10.1.1, EMUI 11.0.1, EMUI 12.0.0" }, { "version_value": "Magic UI 3.0.0, Magic UI 3.1.0, Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability can affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defectsl vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46789", "datePublished": "2022-05-13T15:03:07", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.682Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37113
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.715Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37113", "datePublished": "2022-01-03T21:07:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46856
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\u003c/p\u003e" } ], "value": "The multi-screen collaboration module has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-06T09:04:20.703Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202301-0000001435541166" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46856", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-04T05:17:42.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40051
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40051", "datePublished": "2022-03-07T13:50:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52380
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52380", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:58:37.596989Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-01T14:43:31.786Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.776Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:11:55.892Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52380", "datePublished": "2024-02-18T06:11:55.892Z", "dateReserved": "2024-01-26T06:51:31.237Z", "dateUpdated": "2024-11-01T14:43:31.786Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48288
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48288", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36985
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Code injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may exhaust system resources and cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Code injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36985", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Code injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may exhaust system resources and cause the system to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36985", "datePublished": "2021-10-28T12:25:38", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51510
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51510", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T15:36:54.101614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T15:37:04.355Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "5.0.0" }, { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the logo module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Out-of-bounds access vulnerability in the logo module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T08:24:44.011Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51510", "datePublished": "2024-11-05T08:24:44.011Z", "dateReserved": "2024-10-29T01:43:54.523Z", "dateUpdated": "2024-11-05T15:37:04.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40059
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40059", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40059", "datePublished": "2022-03-07T13:49:53", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46886
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Overwriting Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-26T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/5/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46886", "datePublished": "2023-05-26T00:00:00", "dateReserved": "2023-04-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46813
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46813", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46813", "datePublished": "2022-06-13T15:06:56", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22427
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:49:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22427", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22427", "datePublished": "2021-08-02T16:49:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36992
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Public key verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Implementation of Authentication Algorithm", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Public key verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Implementation of Authentication Algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36992", "datePublished": "2021-10-28T12:26:45", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45447
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-45447", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:11:39.883408Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:11:52.999Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the camera framework module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the camera framework module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T02:16:37.736Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45447", "datePublished": "2024-09-04T02:16:37.736Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:11:52.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41304
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:04.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41304", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:10:26.316499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:10:38.170Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window." } ], "value": "Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:56:35.365Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41304", "datePublished": "2023-10-11T11:56:35.365Z", "dateReserved": "2023-08-28T12:17:09.165Z", "dateUpdated": "2024-09-18T15:10:38.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22486
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.032Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstandardized field names", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22486", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstandardized field names" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22486", "datePublished": "2021-10-28T12:25:05", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37030
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:14:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37030", "datePublished": "2021-11-23T15:14:41", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46839
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a vulnerability of missing bounds check on length.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Lack of length check vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46839", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41603
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.411Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41603", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52371
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52371", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T16:43:42.044147Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:45.116Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of null references in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of null references in the motor module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T03:42:59.747Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52371", "datePublished": "2024-02-18T03:42:59.747Z", "dateReserved": "2024-01-26T06:51:31.235Z", "dateUpdated": "2024-08-02T22:55:41.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41600
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41600", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37043
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncontrolled Resource Consumption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T16:02:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37043", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncontrolled Resource Consumption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37043", "datePublished": "2021-12-07T16:02:05", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39005", "datePublished": "2022-09-16T17:56:07", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44118
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44118", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T13:12:45.649681Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T13:14:46.256Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of undefined permissions in the MeeTime module.Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "value": "Vulnerability of undefined permissions in the MeeTime module.Successful exploitation of this vulnerability will affect availability and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:02:51.902Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44118", "datePublished": "2023-10-11T12:02:51.902Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-19T13:14:46.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39672
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39672", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:14:00.377622Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T18:47:54.551Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory request logic vulnerability in the memory module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "value": "Memory request logic vulnerability in the memory module.\nImpact: Successful exploitation of this vulnerability will affect integrity and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:56:34.465Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39672", "datePublished": "2024-07-25T11:56:34.465Z", "dateReserved": "2024-06-27T08:24:56.589Z", "dateUpdated": "2024-08-02T04:26:15.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38983
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.696Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The BT Hfp Client module has a Use-After-Free (UAF) vulnerability.Successful exploitation of this vulnerability may result in arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38983", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52111
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52111", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T20:34:36.158193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T20:38:40.556Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Authorization vulnerability in the BootLoader module. Successful exploitation of this vulnerability may affect service integrity." } ], "value": "Authorization vulnerability in the BootLoader module. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:55:41.863Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52111", "datePublished": "2024-01-16T07:55:41.863Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-11-13T20:38:40.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39398
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39398", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:32.301326Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:45:08.662Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:34:13.949Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39398", "datePublished": "2023-08-13T12:34:13.949Z", "dateReserved": "2023-07-31T04:41:36.392Z", "dateUpdated": "2024-10-09T19:45:08.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-36501
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36501", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-14T18:19:55.777800Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T18:20:03.531Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:37:05.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Memory management vulnerability in the boottime module\u003cbr\u003eImpact: Successful exploitation of this vulnerability can affect integrity." } ], "value": "Memory management vulnerability in the boottime module\nImpact: Successful exploitation of this vulnerability can affect integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-14T07:21:34.942Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-36501", "datePublished": "2024-06-14T07:21:34.942Z", "dateReserved": "2024-05-29T07:57:22.786Z", "dateUpdated": "2024-08-02T03:37:05.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37245
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:32.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Buffer overflow vulnerability in the modem pinctrl module. Successful exploitation of this vulnerability may affect the integrity and availability of the modem." } ], "value": "Buffer overflow vulnerability in the modem pinctrl module. Successful exploitation of this vulnerability may affect the integrity and availability of the modem." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:32:42.894Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-37245", "datePublished": "2023-07-06T12:32:42.894Z", "dateReserved": "2023-06-29T11:07:22.824Z", "dateUpdated": "2024-08-02T17:09:32.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32991
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32991", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:50:35.572187Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:59.603Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.346Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission verification vulnerability in the wpa_supplicant module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Permission verification vulnerability in the wpa_supplicant module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T09:46:46.963Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32991", "datePublished": "2024-05-11T09:46:46.963Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-box experience bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-box experience bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37004", "datePublished": "2022-08-09T20:10:55", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29789
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:03:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the properties used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29789", "datePublished": "2022-05-13T15:03:59", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44557
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.901Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The SmartTrimProcessEvent module has a vulnerability of obtaining the read and write permissions on arbitrary system files. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44557", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48621
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-48621", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-22T16:55:10.793832Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-30T15:00:41.283Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:55.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing authentication for critical functions in the Wi-Fi module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of missing authentication for critical functions in the Wi-Fi module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:14:48.097Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48621", "datePublished": "2024-02-18T06:14:48.097Z", "dateReserved": "2024-01-26T06:50:21.724Z", "dateUpdated": "2024-10-30T15:00:41.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52102
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52102", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-16T20:27:58.462219Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-23T15:14:38.341Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of parameters being not verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:18:53.963Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52102", "datePublished": "2024-01-16T09:18:53.963Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-10-23T15:14:38.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37034
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstandardized field names", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:16:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstandardized field names" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37034", "datePublished": "2021-11-23T15:16:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49239
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Unauthorized access vulnerability in the card management module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:04:40.379Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49239", "datePublished": "2023-12-06T09:04:40.379Z", "dateReserved": "2023-11-24T07:33:47.174Z", "dateUpdated": "2024-08-02T21:53:44.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32995
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32995", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:49:22.118972Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:52:08.223Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.455Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of service (DoS) vulnerability in the AMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Denial of service (DoS) vulnerability in the AMS module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:00:18.321Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32995", "datePublished": "2024-05-11T10:00:18.321Z", "dateReserved": "2024-04-23T03:44:12.573Z", "dateUpdated": "2024-08-02T02:27:53.455Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39973
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39973", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39973", "datePublished": "2022-01-03T21:07:43", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44558
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Serialization/deserialization mismatch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44558", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22369
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user." } ], "problemTypes": [ { "descriptions": [ { "description": "Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T14:48:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22369", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Time-of-check Time-of-use (TOCTOU) Race Condition" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22369", "datePublished": "2021-06-30T14:48:09", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48301
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.699Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The bundle management module lacks permission verification in some APIs. Successful exploitation of this vulnerability may restore the pre-installed apps that have been uninstalled." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48301", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44099
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module. Successful exploitation of this vulnerability may cause WLAN interruption." } ], "value": "Vulnerability of data verification errors in the kernel module. Successful exploitation of this vulnerability may cause WLAN interruption." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:38:21.835Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44099", "datePublished": "2023-12-06T08:35:43.088Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-08-02T19:59:50.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52099
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-52099", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-13T20:18:55.355916Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-13T20:19:07.044Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of foreground service restrictions being bypassed in the NMS module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T09:13:24.417Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52099", "datePublished": "2024-01-16T09:13:24.417Z", "dateReserved": "2023-12-27T02:33:15.060Z", "dateUpdated": "2024-11-13T20:19:07.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39381
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39381", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T14:19:57.143959Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:20:49.575Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": " Input verification vulnerability in the storage module. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": " Input verification vulnerability in the storage module. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T11:41:06.778Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39381", "datePublished": "2023-08-13T11:41:06.778Z", "dateReserved": "2023-07-31T04:41:32.210Z", "dateUpdated": "2024-10-10T14:20:49.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41582
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The security module has configuration defects.Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41582", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39400
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-39400", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T19:06:25.267703Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T19:36:45.978Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "value": "Parameter verification vulnerability in the installd module. Successful exploitation of this vulnerability may cause sandbox files to be read and written without authorization." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:36:38.636Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39400", "datePublished": "2023-08-13T12:36:38.636Z", "dateReserved": "2023-07-31T04:41:37.870Z", "dateUpdated": "2024-10-09T19:36:45.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22490
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22490", "datePublished": "2021-10-28T12:25:23", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.067Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22253
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper validation of integrity check values Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper validation of integrity check values Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22253", "datePublished": "2022-04-11T19:38:22", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22334
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/4/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.512Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause app redirections." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T19:28:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22334", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause app redirections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22334", "datePublished": "2021-06-03T19:28:49", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31752
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing authorization vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:07:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31752", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing authorization vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31752", "datePublished": "2022-06-13T15:07:45", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39004", "datePublished": "2022-09-16T17:56:03", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48351
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48351", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4566
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:31:06.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:47:38.075Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-4566", "datePublished": "2024-01-16T07:47:38.075Z", "dateReserved": "2023-08-28T12:19:16.087Z", "dateUpdated": "2024-08-02T07:31:06.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22448
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22448", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22448", "datePublished": "2022-02-25T18:11:02", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22394
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22394", "datePublished": "2022-02-25T18:11:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31757
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper use of APIs vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:05:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31757", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper use of APIs vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31757", "datePublished": "2022-06-13T15:05:48", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22324
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/3/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Credentials Management Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T16:21:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22324", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0" }, { "version_value": "Magic UI 4.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Credentials Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22324", "datePublished": "2021-06-03T16:21:01", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40063
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40063", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40063", "datePublished": "2022-03-07T13:49:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41311
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41311", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T13:07:17.669193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T13:07:33.566Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically." } ], "value": "Permission control vulnerability in the audio module. Successful exploitation of this vulnerability may cause an app to be activated automatically." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-26T01:22:20.306Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41311", "datePublished": "2023-09-26T01:22:20.306Z", "dateReserved": "2023-08-28T12:17:09.167Z", "dateUpdated": "2024-09-25T13:07:33.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41580
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exploitation of this vulnerability may cause malicious construction of data, which results in out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41580", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34738
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34738", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34738", "datePublished": "2022-07-11T13:53:41", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48352
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Some smartphones have data initialization issues. Successful exploitation of this vulnerability may cause a system panic." } ], "problemTypes": [ { "descriptions": [ { "description": "Data initialization vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48352", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40056
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Copy without Checking Size of Input", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40056", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Copy without Checking Size of Input" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40056", "datePublished": "2022-03-07T13:50:10", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.862Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48295
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The IHwAntiMalPlugin interface lacks permission verification. Successful exploitation of this vulnerability can lead to filling problems (batch installation of applications)." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48295", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44113
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44113", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-17T20:21:04.197738Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T18:32:25.502Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of missing permission verification for APIs in the Designed for Reliability (DFR) module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of missing permission verification for APIs in the Designed for Reliability (DFR) module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:43:57.730Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44113", "datePublished": "2023-12-06T08:42:11.010Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-10-10T18:32:25.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48292
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an out-of-memory (OOM) vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "OOM vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48292", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48349
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.753Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Spoofing vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48349", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52549
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-52549", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T13:57:08.766881Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T13:58:16.108Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T23:03:20.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of data verification errors in the kernel module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of data verification errors in the kernel module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T08:55:11.618Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/3/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202403-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52549", "datePublished": "2024-04-08T08:55:11.618Z", "dateReserved": "2024-02-27T03:41:51.382Z", "dateUpdated": "2024-08-02T23:03:20.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22430
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22430", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logic bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22430", "datePublished": "2022-02-25T18:11:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6273
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:28:20.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-6273", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-17T20:51:10.909348Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T18:31:23.836Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T09:07:24.345Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-6273", "datePublished": "2023-12-06T09:07:24.345Z", "dateReserved": "2023-11-24T07:33:43.681Z", "dateUpdated": "2024-10-10T18:31:23.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41602
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The phones have the heap overflow, out-of-bounds read, and null pointer vulnerabilities in the fingerprint trusted application (TA).Successful exploitation of this vulnerability may affect the fingerprint service." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap overflow/Out-of-bounds read/Null pointer vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41602", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22322
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/3/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Authentication for Critical Function", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T15:49:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0" }, { "version_value": "Magic UI 4.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Authentication for Critical Function" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22322", "datePublished": "2021-06-03T15:49:12", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39996
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI;HarmonyOS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI;HarmonyOS", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 10.0.0,EMUI 10.1.0,EMUI 10.1.1,EMUI 11.0.0,EMUI 11.0.1" }, { "status": "affected", "version": "Magic UI 3.0.0,Magic UI 3.1.0,Magic UI 3.1.1,Magic UI 4.0.0" }, { "status": "affected", "version": "HarmonyOS 2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI;HarmonyOS", "version": { "version_data": [ { "version_value": "EMUI 10.0.0,EMUI 10.1.0,EMUI 10.1.1,EMUI 11.0.0,EMUI 11.0.1" }, { "version_value": "Magic UI 3.0.0,Magic UI 3.1.0,Magic UI 3.1.1,Magic UI 4.0.0" }, { "version_value": "HarmonyOS 2.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39996", "datePublished": "2022-01-07T22:39:49", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31754
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features." } ], "problemTypes": [ { "descriptions": [ { "description": "Logical defects vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31754", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logical defects vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31754", "datePublished": "2022-06-13T15:06:39", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41599
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The system service has a vulnerability that causes incorrect return values. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect return value vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41599", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29794
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:05:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29794", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a Use After Free (UAF) vulnerability.Successful exploitation of this vulnerability will affect data integrity, availability, and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29794", "datePublished": "2022-05-13T15:05:27", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48299
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authentification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48299", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39390
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39390", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T13:55:34.313756Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-10T14:00:16.996Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "value": "Vulnerability of input parameter verification in certain APIs in the window management module. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:24:06.704Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39390", "datePublished": "2023-08-13T12:24:06.704Z", "dateReserved": "2023-07-31T04:41:36.391Z", "dateUpdated": "2024-10-10T14:00:16.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41295
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41295", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T20:44:45.781241Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T20:44:55.989Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of improper permission management in the displayengine module. Successful exploitation of this vulnerability may cause the screen to turn dim." } ], "value": "Vulnerability of improper permission management in the displayengine module. Successful exploitation of this vulnerability may cause the screen to turn dim." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-12T01:10:43.001Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41295", "datePublished": "2023-09-25T11:02:55.849Z", "dateReserved": "2023-08-28T12:17:07.353Z", "dateUpdated": "2024-09-24T20:44:55.989Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47291
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47291", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:12:36.216067Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:12:46.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission vulnerability in the ActivityManagerService (AMS) module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission vulnerability in the ActivityManagerService (AMS) module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:16:31.299Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47291", "datePublished": "2024-09-27T10:16:31.299Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:12:46.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47294
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47294", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:10:28.595265Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:10:40.364Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the input method framework module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Access permission verification vulnerability in the input method framework module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:23:04.081Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47294", "datePublished": "2024-09-27T10:23:04.081Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:10:40.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40049
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40049", "datePublished": "2022-03-07T13:50:55", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34736
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:52:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34736", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The frame scheduling module has a null pointer dereference vulnerability. Successful exploitation of this vulnerability will affect the kernel availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34736", "datePublished": "2022-07-11T13:52:58", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.053Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48507
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.766Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" }, { "status": "affected", "version": "2.0.1" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of identity verification being bypassed in the storage module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of identity verification being bypassed in the storage module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294 Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-06T12:36:59.628Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/7/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48507", "datePublished": "2023-07-06T12:36:59.628Z", "dateReserved": "2023-06-29T11:23:50.332Z", "dateUpdated": "2024-08-03T15:17:54.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46759
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-46759", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T14:22:17.571595Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T14:24:07.643Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the call module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Permission control vulnerability in the call module. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-08T10:20:04.805Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202311-0000001729189597" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-46759", "datePublished": "2023-11-08T10:20:04.805Z", "dateReserved": "2023-10-26T11:32:55.336Z", "dateUpdated": "2024-09-04T14:24:07.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47293
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47293", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:11:20.752095Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:11:29.485Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds write vulnerability in the HAL-WIFI module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect availability." } ], "value": "Out-of-bounds write vulnerability in the HAL-WIFI module\nImpact: Successful exploitation of this vulnerability may affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:21:46.924Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47293", "datePublished": "2024-09-27T10:21:46.924Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:11:29.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48293
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "OOM vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48293", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22444
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T17:00:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22444", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22444", "datePublished": "2021-08-02T17:00:01", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32997
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-32997", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-11T16:48:12.357889Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:07.625Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:27:53.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Race condition vulnerability in the binder driver module\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Race condition vulnerability in the binder driver module\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-11T10:04:44.743Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-32997", "datePublished": "2024-05-11T10:04:44.743Z", "dateReserved": "2024-04-23T03:44:12.574Z", "dateUpdated": "2024-08-02T02:27:53.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48357
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Some products have the double fetch vulnerability. Successful exploitation of this vulnerability may cause denial of service (DoS) attacks to the kernel." } ], "problemTypes": [ { "descriptions": [ { "description": "Double fetch vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48357", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37038
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37038", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37038", "datePublished": "2021-12-07T15:45:07", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48494
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:17:54.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Privilege Assignment", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48494", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-03T15:17:54.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22491
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22491", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22491", "datePublished": "2021-10-28T12:25:31", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-34156
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.248Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of services denied by early fingerprint APIs on HarmonyOS products.Successful exploitation of this vulnerability may cause services to be denied." } ], "problemTypes": [ { "descriptions": [ { "description": "Services denied", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-19T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/6/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-34156", "datePublished": "2023-06-19T00:00:00", "dateReserved": "2023-05-29T00:00:00", "dateUpdated": "2024-08-02T16:01:54.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31761
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defectsl vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:07:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31761", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defectsl vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31761", "datePublished": "2022-06-13T15:07:29", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38989
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38989", "datePublished": "2022-09-16T17:56:33", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:51.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-44112", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T19:23:26.143999Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T19:46:01.244Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Out-of-bounds access vulnerability in the device authentication module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Out-of-bounds access vulnerability in the device authentication module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T08:00:06.992Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44112", "datePublished": "2024-01-16T08:00:06.992Z", "dateReserved": "2023-09-25T09:11:04.625Z", "dateUpdated": "2024-09-03T19:46:01.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37097
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Code Injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37097", "datePublished": "2021-12-08T14:13:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39671
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "4.2.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39671", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T14:58:23.436608Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T15:02:20.190Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access control vulnerability in the security verification module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access control vulnerability in the security verification module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-840", "description": "CWE-840 Business Logic Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:54:42.395Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39671", "datePublished": "2024-07-25T11:54:42.395Z", "dateReserved": "2024-06-27T08:24:56.589Z", "dateUpdated": "2024-08-02T04:26:15.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39673
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39673", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T15:06:32.203031Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-25T15:06:52.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of serialisation/deserialisation mismatch in the iAware module. Impact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-26", "description": "CWE-26 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:40:24.640Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39673", "datePublished": "2024-07-25T11:40:24.640Z", "dateReserved": "2024-06-27T08:24:56.590Z", "dateUpdated": "2024-08-02T04:26:15.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40045
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Support for Integrity Check", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40045", "datePublished": "2022-02-09T22:03:55", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47292
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47292", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T15:12:04.352298Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T15:12:13.816Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Path traversal vulnerability in the Bluetooth module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Path traversal vulnerability in the Bluetooth module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-27T10:19:33.920Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/10/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-47292", "datePublished": "2024-09-27T10:19:33.920Z", "dateReserved": "2024-09-24T06:26:58.563Z", "dateUpdated": "2024-09-27T15:12:13.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48350
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HUAWEI Messaging app has a vulnerability of unauthorized file access. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48350", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41293
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:54:05.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41293", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:10:47.087990Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:12:33.027Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Data security classification vulnerability in the DDMP module. Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "Data security classification vulnerability in the DDMP module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-227", "description": "CWE-227: 7PK - API Abuse", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T12:18:42.425Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-41293", "datePublished": "2023-09-25T12:18:42.425Z", "dateReserved": "2023-08-28T12:17:07.353Z", "dateUpdated": "2024-09-24T15:12:33.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41584
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this vulnerability may cause memory overwriting." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41584", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:43.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39993
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/12/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.0" }, { "status": "affected", "version": "Magic UI 4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer overflow vulnerability with ACPU in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.0" }, { "version_value": "Magic UI 4.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer overflow vulnerability with ACPU in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/12/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39993", "datePublished": "2022-01-07T22:39:48", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44116
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44116", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:01:35.724856Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:02:43.370Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of access permissions not being strictly verified in the APPWidget module.Successful exploitation of this vulnerability may cause some apps to run without being authorized." } ], "value": "Vulnerability of access permissions not being strictly verified in the APPWidget module.Successful exploitation of this vulnerability may cause some apps to run without being authorized." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T12:01:44.161Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44116", "datePublished": "2023-10-11T12:01:44.161Z", "dateReserved": "2023-09-25T09:11:04.626Z", "dateUpdated": "2024-09-18T15:02:43.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46317
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:31:45.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-46317", "datePublished": "2022-12-20T00:00:00", "dateReserved": "2022-11-29T00:00:00", "dateUpdated": "2024-08-03T14:31:45.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44552
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The lock screen module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44552", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22380
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.229Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 9.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Cleartext Transmission of Sensitive Information Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Cleartext Transmission of Sensitive Information", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-30T13:37:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22380", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_value": "EMUI 9.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Cleartext Transmission of Sensitive Information Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cleartext Transmission of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22380", "datePublished": "2021-06-30T13:37:17", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41578
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:42.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has an out-of-bounds write vulnerability.Successful exploitation of this vulnerability may cause root privilege escalation attacks implemented by modifying program information." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-41578", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-27T00:00:00", "dateUpdated": "2024-08-03T12:49:42.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1694
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:25.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "value": "The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-20T14:13:46.239Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/4/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-1694", "datePublished": "2023-05-20T14:13:46.239Z", "dateReserved": "2023-03-29T09:29:52.497Z", "dateUpdated": "2024-08-02T05:57:25.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-45444
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45444", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T13:19:19.085492Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T13:21:46.703Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Access permission verification vulnerability in the WMS module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Access permission verification vulnerability in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-04T01:51:49.034Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/9/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-45444", "datePublished": "2024-09-04T01:51:49.034Z", "dateReserved": "2024-08-29T06:19:14.882Z", "dateUpdated": "2024-09-04T13:21:46.703Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46895
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46895", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T16:21:38.608896Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T16:21:45.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of defects introduced in the design process in the Multi-Device Task Center. Successful exploitation of this vulnerability will cause the hopped app to bypass the app lock and reset the device that initiates the hop." } ], "value": "Vulnerability of defects introduced in the design process in the Multi-Device Task Center. Successful exploitation of this vulnerability will cause the hopped app to bypass the app lock and reset the device that initiates the hop." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-701", "description": "CWE-701 Weaknesses Introduced During Design", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-13T12:45:33.542Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/8/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202308-0000001667644725" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46895", "datePublished": "2023-08-13T12:45:33.542Z", "dateReserved": "2023-06-29T11:27:53.897Z", "dateUpdated": "2024-10-09T16:21:45.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-44100
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "tags": [ "x_transferred" ], "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44100", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T15:27:17.402567Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-18T15:27:58.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Broadcast permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Issues", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T11:47:55.811Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/" }, { "url": "https://https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-44100", "datePublished": "2023-10-11T11:47:55.811Z", "dateReserved": "2023-09-25T09:11:04.624Z", "dateUpdated": "2024-09-18T15:27:58.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46812
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:04:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46812", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46812", "datePublished": "2022-06-13T15:04:08", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-44551
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:54:03.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The iaware module has a vulnerability in thread security. Successful exploitation of this vulnerability will affect confidentiality, integrity, and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Thread security vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/11/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202211-0000001441016433" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-44551", "datePublished": "2022-11-09T00:00:00", "dateReserved": "2022-11-01T00:00:00", "dateUpdated": "2024-08-03T13:54:03.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52112
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:48:12.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "value": "Unauthorized file access vulnerability in the wallpaper service module. Successful exploitation of this vulnerability may cause features to perform abnormally." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-16T07:57:06.023Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/1/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202401-0000001799925977" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52112", "datePublished": "2024-01-16T07:57:06.023Z", "dateReserved": "2023-12-27T02:33:17.232Z", "dateUpdated": "2024-08-02T22:48:12.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38998
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HISP module has a vulnerability of not verifying the data transferred in the kernel space.Successful exploitation of this vulnerability will cause out-of-bounds read, which affects data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2022/10/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38998", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39409
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39409", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T14:17:08.865172Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:20:17.064Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.0.1" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.1" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "value": "DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T10:50:05.423Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-39409", "datePublished": "2023-09-25T10:50:05.423Z", "dateReserved": "2023-07-31T04:41:37.871Z", "dateUpdated": "2024-09-24T14:20:17.064Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48358
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.686Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The BatteryHealthActivity has a redirection vulnerability. Successful exploitation of this vulnerability by a malicious app can cause service exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Redirection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-27T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202303-0000001529824505" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/3/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48358", "datePublished": "2023-03-27T00:00:00", "dateReserved": "2023-02-25T00:00:00", "dateUpdated": "2024-08-03T15:10:59.686Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-51530
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-51530", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-05T14:40:27.154731Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-05T14:51:43.931Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "LaunchAnywhere vulnerability in the account module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "LaunchAnywhere vulnerability in the account module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T11:19:57.997Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/11/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-51530", "datePublished": "2024-11-05T11:19:57.997Z", "dateReserved": "2024-10-29T01:43:54.528Z", "dateUpdated": "2024-11-05T14:51:43.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39674
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39674", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T13:29:22.273059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:54:53.264Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.999Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Plaintext vulnerability in the Gallery search module.\u003cbr\u003eImpact: Successful exploitation of this vulnerability will affect availability." } ], "value": "Plaintext vulnerability in the Gallery search module.\nImpact: Successful exploitation of this vulnerability will affect availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312 Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-25T11:42:56.291Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/7/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-39674", "datePublished": "2024-07-25T11:42:56.291Z", "dateReserved": "2024-06-27T08:24:56.590Z", "dateUpdated": "2024-08-02T04:26:15.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42037
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "harmonyos", "vendor": "huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "cpes": [ "cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emui", "vendor": "huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42037", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T18:01:36.363093Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T18:03:49.921Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "14.0.0" }, { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of uncaught exceptions in the Graphics module\u003cbr\u003eImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "value": "Vulnerability of uncaught exceptions in the Graphics module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-08T09:30:18.428Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://https://consumer.huawei.com/en/support/bulletin/2024/8/" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2024-42037", "datePublished": "2024-08-08T09:30:18.428Z", "dateReserved": "2024-07-27T06:52:58.401Z", "dateUpdated": "2024-08-09T18:03:49.921Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29796
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstrict verification vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:05:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29796", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HiAIserver has a vulnerability in verifying the validity of the weight used in the model.Successful exploitation of this vulnerability will affect AI services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstrict verification vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-29796", "datePublished": "2022-05-13T15:05:59", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-03T06:33:42.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37119
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37119", "datePublished": "2022-01-03T21:07:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22344
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/5/ | x_refsource_MISC |
▼ | Vendor | Product |
---|---|---|
n/a | EMUI;Magic UI |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.510Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI;Magic UI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "status": "affected", "version": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-01T11:10:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22344", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI;Magic UI", "version": { "version_data": [ { "version_value": "EMUI 11.0.1,EMUI 11.0.0,EMUI 10.1.1" }, { "version_value": "Magic UI 4.0.0,Magic UI 3.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22344", "datePublished": "2021-07-01T11:10:15", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39974
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39974", "datePublished": "2022-01-03T21:07:44", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49248
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:53:44.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access." } ], "value": "Vulnerability of unauthorized file access in the Settings app. Successful exploitation of this vulnerability may cause unauthorized file access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-06T08:34:22.774Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2023/12/" }, { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202312-0000001758430245" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-49248", "datePublished": "2023-12-06T08:34:22.774Z", "dateReserved": "2023-11-24T07:33:47.176Z", "dateUpdated": "2024-08-02T21:53:44.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52375
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52375", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-20T17:05:15.664300Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:21:46.551Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Permission control vulnerability in the WindowManagerServices module.Successful exploitation of this vulnerability may affect availability." } ], "value": "Permission control vulnerability in the WindowManagerServices module.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permissions, Privileges, and Access Controls", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T06:05:11.201Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52375", "datePublished": "2024-02-18T06:05:11.201Z", "dateReserved": "2024-01-26T06:51:31.236Z", "dateUpdated": "2024-08-02T22:55:41.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-48297
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:10:59.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The geofencing kernel code has a vulnerability of not verifying the length of the input data. Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-09T00:00:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202302-0000001454769474" }, { "url": "https://consumer.huawei.com/en/support/bulletin/2023/2/" } ] } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-48297", "datePublished": "2023-02-09T00:00:00", "dateReserved": "2023-01-29T00:00:00", "dateUpdated": "2024-08-03T15:10:59.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-52357
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-52357", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T18:42:34.704872Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:23:32.098Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:55:41.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "tags": [ "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.0" }, { "status": "affected", "version": "2.0.0" } ] }, { "defaultStatus": "unaffected", "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "13.0.0" }, { "status": "affected", "version": "12.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerability of serialization/deserialization mismatch in the vibration framework.Successful exploitation of this vulnerability may affect availability." } ], "value": "Vulnerability of serialization/deserialization mismatch in the vibration framework.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-18T02:56:01.549Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://consumer.huawei.com/en/support/bulletin/2024/2/" }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202402-0000001834855405" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2023-52357", "datePublished": "2024-02-18T02:56:01.549Z", "dateReserved": "2024-01-26T06:51:31.233Z", "dateUpdated": "2024-08-02T22:55:41.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }